Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
130s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12/02/2024, 05:56
Static task
static1
Behavioral task
behavioral1
Sample
966b785b2c7845b2ea36d78b0a0be0fc.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
966b785b2c7845b2ea36d78b0a0be0fc.exe
Resource
win10v2004-20231215-en
General
-
Target
966b785b2c7845b2ea36d78b0a0be0fc.exe
-
Size
28KB
-
MD5
966b785b2c7845b2ea36d78b0a0be0fc
-
SHA1
ec447e5ee368fb1517dff1875986072d4ef45d8d
-
SHA256
a6ca5e48bdb7b47ee38180a99f643cafe21d1f9791e5396df88db496fc7b55ea
-
SHA512
bdecb232cc24bd3e08dc24f30c7f96113fee048140a20963904d2d420f18e1ddb3913daadef78e1471fed04620d2fd4de3bd30a6f62d9aa5593e504200062c13
-
SSDEEP
384:a4s5I8F9SkgNcR0Om9DdziH1dPQSch/3+r21yn:a4sLF4kgK0dzydP0F3+r2+
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 966b785b2c7845b2ea36d78b0a0be0fc.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation ravsprselry.exe -
Executes dropped EXE 2 IoCs
pid Process 220 ravsprselry.exe 4964 ravsprselry.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ravsprselry.exe ravsprselry.exe File created C:\Windows\SysWOW64\ravsprselry.exe ravsprselry.exe File opened for modification C:\Windows\SysWOW64\ravsprselry.exe ravsprselry.exe File created C:\Windows\SysWOW64\ravsprselry.exe 966b785b2c7845b2ea36d78b0a0be0fc.exe File opened for modification C:\Windows\SysWOW64\ravsprselry.exe 966b785b2c7845b2ea36d78b0a0be0fc.exe File created C:\Windows\SysWOW64\ravsprselry.exe ravsprselry.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 966b785b2c7845b2ea36d78b0a0be0fc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ ravsprselry.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3976 966b785b2c7845b2ea36d78b0a0be0fc.exe 3976 966b785b2c7845b2ea36d78b0a0be0fc.exe 220 ravsprselry.exe 220 ravsprselry.exe 4964 ravsprselry.exe 4964 ravsprselry.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3976 wrote to memory of 220 3976 966b785b2c7845b2ea36d78b0a0be0fc.exe 92 PID 3976 wrote to memory of 220 3976 966b785b2c7845b2ea36d78b0a0be0fc.exe 92 PID 3976 wrote to memory of 220 3976 966b785b2c7845b2ea36d78b0a0be0fc.exe 92 PID 220 wrote to memory of 4964 220 ravsprselry.exe 93 PID 220 wrote to memory of 4964 220 ravsprselry.exe 93 PID 220 wrote to memory of 4964 220 ravsprselry.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\966b785b2c7845b2ea36d78b0a0be0fc.exe"C:\Users\Admin\AppData\Local\Temp\966b785b2c7845b2ea36d78b0a0be0fc.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\Windows\SysWOW64\ravsprselry.exe"C:\Windows\system32\ravsprselry.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Windows\SysWOW64\ravsprselry.exe"C:\Windows\system32\ravsprselry.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:4964 -
C:\Windows\SysWOW64\ravsprselry.exe"C:\Windows\system32\ravsprselry.exe"4⤵PID:1368
-
C:\Windows\SysWOW64\ravsprselry.exe"C:\Windows\system32\ravsprselry.exe"5⤵PID:4024
-
C:\Windows\SysWOW64\ravsprselry.exe"C:\Windows\system32\ravsprselry.exe"6⤵PID:4320
-
C:\Windows\SysWOW64\ravsprselry.exe"C:\Windows\system32\ravsprselry.exe"7⤵PID:3368
-
C:\Windows\SysWOW64\ravsprselry.exe"C:\Windows\system32\ravsprselry.exe"8⤵PID:4284
-
C:\Windows\SysWOW64\ravsprselry.exe"C:\Windows\system32\ravsprselry.exe"9⤵PID:4688
-
C:\Windows\SysWOW64\ravsprselry.exe"C:\Windows\system32\ravsprselry.exe"10⤵PID:836
-
C:\Windows\SysWOW64\ravsprselry.exe"C:\Windows\system32\ravsprselry.exe"11⤵PID:1532
-
C:\Windows\SysWOW64\ravsprselry.exe"C:\Windows\system32\ravsprselry.exe"12⤵PID:1296
-
C:\Windows\SysWOW64\ravsprselry.exe"C:\Windows\system32\ravsprselry.exe"13⤵PID:4592
-
C:\Windows\SysWOW64\ravsprselry.exe"C:\Windows\system32\ravsprselry.exe"14⤵PID:1100
-
C:\Windows\SysWOW64\ravsprselry.exe"C:\Windows\system32\ravsprselry.exe"15⤵PID:2208
-
C:\Windows\SysWOW64\ravsprselry.exe"C:\Windows\system32\ravsprselry.exe"16⤵PID:1840
-
C:\Windows\SysWOW64\ravsprselry.exe"C:\Windows\system32\ravsprselry.exe"17⤵PID:3340
-
C:\Windows\SysWOW64\ravsprselry.exe"C:\Windows\system32\ravsprselry.exe"18⤵PID:4972
-
C:\Windows\SysWOW64\ravsprselry.exe"C:\Windows\system32\ravsprselry.exe"19⤵PID:2440
-
C:\Windows\SysWOW64\ravsprselry.exe"C:\Windows\system32\ravsprselry.exe"20⤵PID:2972
-
C:\Windows\SysWOW64\ravsprselry.exe"C:\Windows\system32\ravsprselry.exe"21⤵PID:872
-
C:\Windows\SysWOW64\ravsprselry.exe"C:\Windows\system32\ravsprselry.exe"22⤵PID:2308
-
C:\Windows\SysWOW64\ravsprselry.exe"C:\Windows\system32\ravsprselry.exe"23⤵PID:1616
-
C:\Windows\SysWOW64\ravsprselry.exe"C:\Windows\system32\ravsprselry.exe"24⤵PID:4016
-
C:\Windows\SysWOW64\ravsprselry.exe"C:\Windows\system32\ravsprselry.exe"25⤵PID:1924
-
C:\Windows\SysWOW64\ravsprselry.exe"C:\Windows\system32\ravsprselry.exe"26⤵PID:3416
-
C:\Windows\SysWOW64\ravsprselry.exe"C:\Windows\system32\ravsprselry.exe"27⤵PID:3352
-
C:\Windows\SysWOW64\ravsprselry.exe"C:\Windows\system32\ravsprselry.exe"28⤵PID:3664
-
C:\Windows\SysWOW64\ravsprselry.exe"C:\Windows\system32\ravsprselry.exe"29⤵PID:4628
-
C:\Windows\SysWOW64\ravsprselry.exe"C:\Windows\system32\ravsprselry.exe"30⤵PID:3764
-
C:\Windows\SysWOW64\ravsprselry.exe"C:\Windows\system32\ravsprselry.exe"31⤵PID:1528
-
C:\Windows\SysWOW64\ravsprselry.exe"C:\Windows\system32\ravsprselry.exe"32⤵PID:2644
-
C:\Windows\SysWOW64\ravsprselry.exe"C:\Windows\system32\ravsprselry.exe"33⤵PID:4792
-
C:\Windows\SysWOW64\ravsprselry.exe"C:\Windows\system32\ravsprselry.exe"34⤵PID:2648
-
C:\Windows\SysWOW64\ravsprselry.exe"C:\Windows\system32\ravsprselry.exe"35⤵PID:4632
-
C:\Windows\SysWOW64\ravsprselry.exe"C:\Windows\system32\ravsprselry.exe"36⤵PID:4944
-
C:\Windows\SysWOW64\ravsprselry.exe"C:\Windows\system32\ravsprselry.exe"37⤵PID:2808
-
C:\Windows\SysWOW64\ravsprselry.exe"C:\Windows\system32\ravsprselry.exe"38⤵PID:1996
-
C:\Windows\SysWOW64\ravsprselry.exe"C:\Windows\system32\ravsprselry.exe"39⤵PID:4784
-
C:\Windows\SysWOW64\ravsprselry.exe"C:\Windows\system32\ravsprselry.exe"40⤵PID:1700
-
C:\Windows\SysWOW64\ravsprselry.exe"C:\Windows\system32\ravsprselry.exe"41⤵PID:3292
-
C:\Windows\SysWOW64\ravsprselry.exe"C:\Windows\system32\ravsprselry.exe"42⤵PID:1880
-
C:\Windows\SysWOW64\ravsprselry.exe"C:\Windows\system32\ravsprselry.exe"43⤵PID:3812
-
C:\Windows\SysWOW64\ravsprselry.exe"C:\Windows\system32\ravsprselry.exe"44⤵PID:4848
-
C:\Windows\SysWOW64\ravsprselry.exe"C:\Windows\system32\ravsprselry.exe"45⤵PID:336
-
C:\Windows\SysWOW64\ravsprselry.exe"C:\Windows\system32\ravsprselry.exe"46⤵PID:1636
-
C:\Windows\SysWOW64\ravsprselry.exe"C:\Windows\system32\ravsprselry.exe"47⤵PID:3688
-
C:\Windows\SysWOW64\ravsprselry.exe"C:\Windows\system32\ravsprselry.exe"48⤵PID:1552
-
C:\Windows\SysWOW64\ravsprselry.exe"C:\Windows\system32\ravsprselry.exe"49⤵PID:4404
-
C:\Windows\SysWOW64\ravsprselry.exe"C:\Windows\system32\ravsprselry.exe"50⤵PID:4420
-
C:\Windows\SysWOW64\ravsprselry.exe"C:\Windows\system32\ravsprselry.exe"51⤵PID:3612
-
C:\Windows\SysWOW64\ravsprselry.exe"C:\Windows\system32\ravsprselry.exe"52⤵PID:2440
-
C:\Windows\SysWOW64\ravsprselry.exe"C:\Windows\system32\ravsprselry.exe"53⤵PID:1156
-
C:\Windows\SysWOW64\ravsprselry.exe"C:\Windows\system32\ravsprselry.exe"54⤵PID:1772
-
C:\Windows\SysWOW64\ravsprselry.exe"C:\Windows\system32\ravsprselry.exe"55⤵PID:2280
-
C:\Windows\SysWOW64\ravsprselry.exe"C:\Windows\system32\ravsprselry.exe"56⤵PID:2116
-
C:\Windows\SysWOW64\ravsprselry.exe"C:\Windows\system32\ravsprselry.exe"57⤵PID:2884
-
C:\Windows\SysWOW64\ravsprselry.exe"C:\Windows\system32\ravsprselry.exe"58⤵PID:1720
-
C:\Windows\SysWOW64\ravsprselry.exe"C:\Windows\system32\ravsprselry.exe"59⤵PID:3968
-
C:\Windows\SysWOW64\ravsprselry.exe"C:\Windows\system32\ravsprselry.exe"60⤵PID:2032
-
C:\Windows\SysWOW64\ravsprselry.exe"C:\Windows\system32\ravsprselry.exe"61⤵PID:3312
-
C:\Windows\SysWOW64\ravsprselry.exe"C:\Windows\system32\ravsprselry.exe"62⤵PID:3524
-
C:\Windows\SysWOW64\ravsprselry.exe"C:\Windows\system32\ravsprselry.exe"63⤵PID:4772
-
C:\Windows\SysWOW64\ravsprselry.exe"C:\Windows\system32\ravsprselry.exe"64⤵PID:2196
-
C:\Windows\SysWOW64\ravsprselry.exe"C:\Windows\system32\ravsprselry.exe"65⤵PID:3392
-
C:\Windows\SysWOW64\ravsprselry.exe"C:\Windows\system32\ravsprselry.exe"66⤵PID:2644
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD5a5235ed3a78e9760a0fa6c4e2a442987
SHA1654ef79553f7393239962c647829409ffd0467ca
SHA256bb1c89243ed0755e5d5dcf6fc972b9c7dfd874f81b0c949407bb0f4189a6e1a5
SHA512b8b534c8493d265b4afe39746fea448a837bab71793dc7fbd6dea39558cca79c3931713330413f909f2091f86685a745b7e95a5b8fa7e302facfa949344ed883
-
Filesize
28KB
MD5966b785b2c7845b2ea36d78b0a0be0fc
SHA1ec447e5ee368fb1517dff1875986072d4ef45d8d
SHA256a6ca5e48bdb7b47ee38180a99f643cafe21d1f9791e5396df88db496fc7b55ea
SHA512bdecb232cc24bd3e08dc24f30c7f96113fee048140a20963904d2d420f18e1ddb3913daadef78e1471fed04620d2fd4de3bd30a6f62d9aa5593e504200062c13