Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
29/01/2024, 14:46
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.MSIL.Crypt.19699.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Trojan.MSIL.Crypt.19699.exe
Resource
win10v2004-20231222-en
General
-
Target
SecuriteInfo.com.Trojan.MSIL.Crypt.19699.exe
-
Size
681KB
-
MD5
2c6646286a2e2682229fa060c1d16374
-
SHA1
4b78d96b33e9da1a3f819d04945a6e20e26ff955
-
SHA256
01f69aee0b89173efd74b9ab64b4f6b9a2f4810ec1778983d71ed4c8ed5824b7
-
SHA512
f37fa9350e713a25c51d752870d63341c1486e01de5b8aff234ab294429443f072dbd41b6b1ffd9389cea7e70e62cf691a5a31ed5c47fe48bcfca881ae970e3b
-
SSDEEP
12288:+Gk0OTKGZrQQE97YCdjhrZiVdO7KOviMIgtCG2PdgHodcp7iJ2gfpZlNK2dmbVCt:6VDzCdRZ7jggtCG2Pkn
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation SecuriteInfo.com.Trojan.MSIL.Crypt.19699.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4088 set thread context of 3644 4088 SecuriteInfo.com.Trojan.MSIL.Crypt.19699.exe 98 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5984 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4088 SecuriteInfo.com.Trojan.MSIL.Crypt.19699.exe 4088 SecuriteInfo.com.Trojan.MSIL.Crypt.19699.exe 3948 powershell.exe 3948 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4088 SecuriteInfo.com.Trojan.MSIL.Crypt.19699.exe Token: SeDebugPrivilege 3948 powershell.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 4088 wrote to memory of 3948 4088 SecuriteInfo.com.Trojan.MSIL.Crypt.19699.exe 103 PID 4088 wrote to memory of 3948 4088 SecuriteInfo.com.Trojan.MSIL.Crypt.19699.exe 103 PID 4088 wrote to memory of 5984 4088 SecuriteInfo.com.Trojan.MSIL.Crypt.19699.exe 102 PID 4088 wrote to memory of 5984 4088 SecuriteInfo.com.Trojan.MSIL.Crypt.19699.exe 102 PID 4088 wrote to memory of 3644 4088 SecuriteInfo.com.Trojan.MSIL.Crypt.19699.exe 98 PID 4088 wrote to memory of 3644 4088 SecuriteInfo.com.Trojan.MSIL.Crypt.19699.exe 98 PID 4088 wrote to memory of 3644 4088 SecuriteInfo.com.Trojan.MSIL.Crypt.19699.exe 98 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.MSIL.Crypt.19699.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.MSIL.Crypt.19699.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.MSIL.Crypt.19699.exeC:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.MSIL.Crypt.19699.exe2⤵PID:3644
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wbpGajDkhWs" /XML "C:\Users\Admin\AppData\Local\Temp\tmpA807.tmp"2⤵
- Creates scheduled task(s)
PID:5984
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\wbpGajDkhWs.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3948
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD5c6fe657c484b41d82beb3645e18b9fe9
SHA18971ab8184108c3c5cea8c06076186bef6c7e2cb
SHA25631af0e0427ffcb622760f78dc59d306dbb19813a065b1647011a4fdb66a97b5c
SHA51236612e4c7447baab45e4f757f07a0cb62dd09d3fab9546b3fbcf4bf54fb00e5a6090e51b07678fbc746c5bbc45bed7b84b84045606cf5a5f044d7ec6a906e82b