Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
87s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12/02/2024, 03:41
Static task
static1
Behavioral task
behavioral1
Sample
630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe
Resource
win10v2004-20231215-en
General
-
Target
630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe
-
Size
2.2MB
-
MD5
ff6a97f7237340437c36c597b1b4b4a0
-
SHA1
d8332b167a813713507d12aa84d0c8156787b258
-
SHA256
630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf
-
SHA512
7c271cb4e986b9634ee87eb5b8ce06f48ad7459209a82a8e8343c76d168d18c0d2d39033f962efa24998e3429900a117bd7bef7465a372d2ae913ad7f9d729a0
-
SSDEEP
49152:7PxJxCKDN29VzbJVACCQUv9OUsvpYCcRwj79MVqg78+rWv1+FTqSkPFqzybEluam:dCIeBEQUv9AqCh9Ml8Bv1+FqSkPFqzct
Malware Config
Signatures
-
Creates new service(s) 1 TTPs
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\System32\drivers\ee.sys 630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe -
Stops running service(s) 3 TTPs
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation 630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 2484 630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe 2484 630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe 2484 630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe 2484 630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe 2484 630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4524 sc.exe 3668 sc.exe 2704 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 3 IoCs
pid Process 4068 taskkill.exe 4396 taskkill.exe 4332 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2484 630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe 2484 630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe 2484 630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe 2484 630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe 2484 630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe 2484 630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe 2484 630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe 2484 630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe 2484 630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe 2484 630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe 2484 630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe 2484 630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe 2484 630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe 2484 630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe 2484 630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe 2484 630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe 2484 630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe 2484 630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe 2484 630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe 2484 630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe 2484 630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe 2484 630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe 2484 630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe 2484 630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe 2484 630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe 2484 630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe 2484 630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe 2484 630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe 2484 630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe 2484 630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe 2484 630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe 2484 630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe 2484 630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe 2484 630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe 2484 630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe 2484 630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe 2484 630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe 2484 630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe 2484 630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe 2484 630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe 2484 630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe 2484 630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe 2484 630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe 2484 630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe 2484 630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe 2484 630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe 2484 630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe 2484 630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe 2484 630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe 2484 630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe 2484 630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe 2484 630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe 2484 630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe 2484 630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe 2484 630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe 2484 630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe 2484 630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe 2484 630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe 2484 630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe 2484 630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe 2484 630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe 2484 630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe 2484 630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe 2484 630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 660 Process not Found -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4068 taskkill.exe Token: SeDebugPrivilege 4396 taskkill.exe Token: SeDebugPrivilege 4332 taskkill.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2484 wrote to memory of 1808 2484 630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe 18 PID 2484 wrote to memory of 1808 2484 630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe 18 PID 2484 wrote to memory of 2904 2484 630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe 94 PID 2484 wrote to memory of 2904 2484 630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe 94 PID 2484 wrote to memory of 2644 2484 630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe 90 PID 2484 wrote to memory of 2644 2484 630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe 90 PID 2904 wrote to memory of 3668 2904 cmd.exe 92 PID 2904 wrote to memory of 3668 2904 cmd.exe 92 PID 2644 wrote to memory of 4524 2644 cmd.exe 91 PID 2644 wrote to memory of 4524 2644 cmd.exe 91 PID 2484 wrote to memory of 4324 2484 630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe 99 PID 2484 wrote to memory of 4324 2484 630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe 99 PID 2484 wrote to memory of 1676 2484 630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe 98 PID 2484 wrote to memory of 1676 2484 630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe 98 PID 2484 wrote to memory of 3172 2484 630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe 102 PID 2484 wrote to memory of 3172 2484 630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe 102 PID 4324 wrote to memory of 2704 4324 cmd.exe 101 PID 4324 wrote to memory of 2704 4324 cmd.exe 101 PID 3172 wrote to memory of 4068 3172 cmd.exe 100 PID 3172 wrote to memory of 4068 3172 cmd.exe 100 PID 2484 wrote to memory of 2828 2484 630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe 105 PID 2484 wrote to memory of 2828 2484 630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe 105 PID 2828 wrote to memory of 4396 2828 cmd.exe 106 PID 2828 wrote to memory of 4396 2828 cmd.exe 106 PID 2484 wrote to memory of 4592 2484 630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe 107 PID 2484 wrote to memory of 4592 2484 630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe 107 PID 4592 wrote to memory of 4332 4592 cmd.exe 108 PID 4592 wrote to memory of 4332 4592 cmd.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe"C:\Users\Admin\AppData\Local\Temp\630f154b816a6412a621ad2173738a6063a0b61a14375342879666fc97b43dcf.exe"1⤵
- Drops file in Drivers directory
- Checks computer location settings
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:1808
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C sc start ET2⤵
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\system32\sc.exesc start ET3⤵
- Launches sc.exe
PID:4524
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C sc create ET binPath=C:\Windows\System32\drivers\ee.sys type= kernel2⤵
- Suspicious use of WriteProcessMemory
PID:2904
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:1676
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C sc delete ET2⤵
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Windows\system32\sc.exesc delete ET3⤵
- Launches sc.exe
PID:2704
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im FortniteClient-Win64-Shipping.exe >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:3172
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im Era.exe >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\system32\taskkill.exetaskkill /f /im Era.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4396
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im NovaLauncher.exe >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Windows\system32\taskkill.exetaskkill /f /im NovaLauncher.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4332
-
-
-
C:\Windows\system32\sc.exesc create ET binPath=C:\Windows\System32\drivers\ee.sys type= kernel1⤵
- Launches sc.exe
PID:3668
-
C:\Windows\system32\taskkill.exetaskkill /f /im FortniteClient-Win64-Shipping.exe1⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4068