Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12/02/2024, 04:31
Static task
static1
Behavioral task
behavioral1
Sample
964131af4ad550c0e046601f63e29251.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
964131af4ad550c0e046601f63e29251.exe
Resource
win10v2004-20231215-en
General
-
Target
964131af4ad550c0e046601f63e29251.exe
-
Size
653KB
-
MD5
964131af4ad550c0e046601f63e29251
-
SHA1
55beb4cb739fa96ff0b556a510e6351372cd7422
-
SHA256
e01303cb6615c17974dbd1fd571c8324bbd07cdedbc2456387d3b1ba3d415647
-
SHA512
6a7c6af711257ddb4c18b1bbc4f2c7fddaa6fac669ac77de8724e3d6c8ce0f7a0a16324e7bb0e786849a3e8f54ae8c7c578b9a355b37f156126631038fea8d8c
-
SSDEEP
12288:7bqGhoQMUfg/JUTphqrMpPholV6QOIAqPqihTujDmL5o:HzIUI/JUTphPp5cRAwqieil
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 964131af4ad550c0e046601f63e29251.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\bass.dll 964131af4ad550c0e046601f63e29251.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 43 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\phpfile\DefaultIcon\ = "C:\\ProgramData\\KrazSE\\se.exe,0" 964131af4ad550c0e046601f63e29251.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SE 964131af4ad550c0e046601f63e29251.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SE\shell\ 964131af4ad550c0e046601f63e29251.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{57DB3D67-0E61-4618-BBDA-6973653DCFD8\Insertable 964131af4ad550c0e046601f63e29251.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.php\ShellNew\ 964131af4ad550c0e046601f63e29251.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.php\ShellNew\command = "\"C:\\ProgramData\\KrazSE\\se.exe\" \"C:\\ProgramData\\KrazSE\\ShellNew.php\" \"%1\"" 964131af4ad550c0e046601f63e29251.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\phpfile\shell\open\command\ = "C:\\ProgramData\\KrazSE\\se.exe \"%1\" \"%2\" \"%3\"" 964131af4ad550c0e046601f63e29251.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SE\URL Protocol 964131af4ad550c0e046601f63e29251.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 964131af4ad550c0e046601f63e29251.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\KrazSE.Document\Insertable\ 964131af4ad550c0e046601f63e29251.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.php 964131af4ad550c0e046601f63e29251.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\phpfile\shell\open\command 964131af4ad550c0e046601f63e29251.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\phpfile\shell\compile\command\ = "C:\\ProgramData\\KrazSE\\se.exe \"c\" \"%1\" \"%2\" \"%3\"" 964131af4ad550c0e046601f63e29251.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\phpfile\shell\saver\ = "Bildschirmschoner erzeugen" 964131af4ad550c0e046601f63e29251.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\phpfile\shell\saver\command 964131af4ad550c0e046601f63e29251.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SE\shell\open\command 964131af4ad550c0e046601f63e29251.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\phpfile\shell\open 964131af4ad550c0e046601f63e29251.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\phpfile\shell\saver 964131af4ad550c0e046601f63e29251.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 964131af4ad550c0e046601f63e29251.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{57DB3D67-0E61-4618-BBDA-6973653DCFD8 964131af4ad550c0e046601f63e29251.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\phpfile 964131af4ad550c0e046601f63e29251.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\phpfile\shell\ 964131af4ad550c0e046601f63e29251.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\phpfile\shell\compile\ = "Anwendung erzeugen" 964131af4ad550c0e046601f63e29251.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SE\Source Filter 964131af4ad550c0e046601f63e29251.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SE\shell 964131af4ad550c0e046601f63e29251.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\phpfile\DefaultIcon 964131af4ad550c0e046601f63e29251.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\phpfile\shell 964131af4ad550c0e046601f63e29251.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\phpfile\shell\open\ = "Ausführen" 964131af4ad550c0e046601f63e29251.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SE\shell\open 964131af4ad550c0e046601f63e29251.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.php\ = "phpfile" 964131af4ad550c0e046601f63e29251.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\phpfile\ = "KrazSE Dokument" 964131af4ad550c0e046601f63e29251.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.php\ShellNew\nullfile 964131af4ad550c0e046601f63e29251.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\phpfile\shell\compile\command 964131af4ad550c0e046601f63e29251.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\KrazSE.Document\Insertable 964131af4ad550c0e046601f63e29251.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{57DB3D67-0E61-4618-BBDA-6973653DCFD8\Insertable\ 964131af4ad550c0e046601f63e29251.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SE\shell\open\command\ = "C:\\ProgramData\\KrazSE\\se.exe \"%1\" \"%2\" \"%3\"" 964131af4ad550c0e046601f63e29251.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\KrazSE.Document 964131af4ad550c0e046601f63e29251.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.php\ShellNew 964131af4ad550c0e046601f63e29251.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\phpfile\shell\compile 964131af4ad550c0e046601f63e29251.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\phpfile\shell\saver\command\ = "C:\\ProgramData\\KrazSE\\se.exe \"cs\" \"%1\" \"%2\" \"%3\"" 964131af4ad550c0e046601f63e29251.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SE\ 964131af4ad550c0e046601f63e29251.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SE\ = "URL:SE (KrazSE UrlProtocol)" 964131af4ad550c0e046601f63e29251.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SE\shell\open\ 964131af4ad550c0e046601f63e29251.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1976 wrote to memory of 5072 1976 964131af4ad550c0e046601f63e29251.exe 84 PID 1976 wrote to memory of 5072 1976 964131af4ad550c0e046601f63e29251.exe 84 PID 1976 wrote to memory of 5072 1976 964131af4ad550c0e046601f63e29251.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\964131af4ad550c0e046601f63e29251.exe"C:\Users\Admin\AppData\Local\Temp\964131af4ad550c0e046601f63e29251.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" "/s" "C:\ProgramData\KrazSE\KrazSE.dll"2⤵PID:5072
-