Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
137s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13/02/2024, 12:18
Static task
static1
Behavioral task
behavioral1
Sample
996887ad773945a7884931c5f1ff5c94.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
996887ad773945a7884931c5f1ff5c94.exe
Resource
win10v2004-20231215-en
General
-
Target
996887ad773945a7884931c5f1ff5c94.exe
-
Size
61KB
-
MD5
996887ad773945a7884931c5f1ff5c94
-
SHA1
bbe87a1764221a20f8f35b4291ddb5cce7a8f468
-
SHA256
ff1caada5738fcb6cd6e4e83841e2bdfe49cbf767d7d4d6f1fd437e56b702a89
-
SHA512
7ec3b233032423ce0d09dbb23b31af24f82469b07e0ff11b728bcbc3e22bf95e829a14565fe8b8199d461ed431f3b2d19146ff8cf934c92fb2eb650266a0dfaa
-
SSDEEP
1536:B4lqiNHnPSMQQ+Z45SNTxdBlsZr48ECzJP0xBt7haC:GaMQ/7NdrlxaFPkt9
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\996887ad773945a7884931c5f1ff5c94.exe\"" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\996887ad773945a7884931c5f1ff5c94.exe\"" regedit.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 996887ad773945a7884931c5f1ff5c94.exe -
Executes dropped EXE 1 IoCs
pid Process 4012 msdtr.exe -
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\g: 996887ad773945a7884931c5f1ff5c94.exe File opened (read-only) \??\y: 996887ad773945a7884931c5f1ff5c94.exe File opened (read-only) \??\a: 996887ad773945a7884931c5f1ff5c94.exe File opened (read-only) \??\f: 996887ad773945a7884931c5f1ff5c94.exe File opened (read-only) \??\h: 996887ad773945a7884931c5f1ff5c94.exe File opened (read-only) \??\l: 996887ad773945a7884931c5f1ff5c94.exe File opened (read-only) \??\r: 996887ad773945a7884931c5f1ff5c94.exe File opened (read-only) \??\u: 996887ad773945a7884931c5f1ff5c94.exe File opened (read-only) \??\d: 996887ad773945a7884931c5f1ff5c94.exe File opened (read-only) \??\p: 996887ad773945a7884931c5f1ff5c94.exe File opened (read-only) \??\v: 996887ad773945a7884931c5f1ff5c94.exe File opened (read-only) \??\t: 996887ad773945a7884931c5f1ff5c94.exe File opened (read-only) \??\x: 996887ad773945a7884931c5f1ff5c94.exe File opened (read-only) \??\z: 996887ad773945a7884931c5f1ff5c94.exe File opened (read-only) \??\j: 996887ad773945a7884931c5f1ff5c94.exe File opened (read-only) \??\m: 996887ad773945a7884931c5f1ff5c94.exe File opened (read-only) \??\b: 996887ad773945a7884931c5f1ff5c94.exe File opened (read-only) \??\e: 996887ad773945a7884931c5f1ff5c94.exe File opened (read-only) \??\i: 996887ad773945a7884931c5f1ff5c94.exe File opened (read-only) \??\k: 996887ad773945a7884931c5f1ff5c94.exe File opened (read-only) \??\n: 996887ad773945a7884931c5f1ff5c94.exe File opened (read-only) \??\w: 996887ad773945a7884931c5f1ff5c94.exe File opened (read-only) \??\o: 996887ad773945a7884931c5f1ff5c94.exe File opened (read-only) \??\q: 996887ad773945a7884931c5f1ff5c94.exe File opened (read-only) \??\s: 996887ad773945a7884931c5f1ff5c94.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4444 4012 WerFault.exe 84 -
Runs .reg file with regedit 1 IoCs
pid Process 5100 regedit.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3952 wrote to memory of 5100 3952 996887ad773945a7884931c5f1ff5c94.exe 83 PID 3952 wrote to memory of 5100 3952 996887ad773945a7884931c5f1ff5c94.exe 83 PID 3952 wrote to memory of 5100 3952 996887ad773945a7884931c5f1ff5c94.exe 83 PID 3952 wrote to memory of 4012 3952 996887ad773945a7884931c5f1ff5c94.exe 84 PID 3952 wrote to memory of 4012 3952 996887ad773945a7884931c5f1ff5c94.exe 84 PID 3952 wrote to memory of 4012 3952 996887ad773945a7884931c5f1ff5c94.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\996887ad773945a7884931c5f1ff5c94.exe"C:\Users\Admin\AppData\Local\Temp\996887ad773945a7884931c5f1ff5c94.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:3952 -
C:\Windows\SysWOW64\regedit.exeregedit.exe /s C:\Users\Admin\AppData\Local\Temp\aaa.reg2⤵
- Modifies WinLogon for persistence
- Runs .reg file with regedit
PID:5100
-
-
C:\Users\Admin\AppData\Local\Temp\msdtr.exeC:\Users\Admin\AppData\Local\Temp\msdtr.exe2⤵
- Executes dropped EXE
PID:4012 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4012 -s 5323⤵
- Program crash
PID:4444
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 180 -p 4012 -ip 40121⤵PID:4804
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
413B
MD5e62423d7be4ca6661ca629d6b7a9a104
SHA1ae0e34911292701ff9c94869364a36b98ef76fed
SHA25611fa728742f4d51b25bc1e16fc77db63226fc702c10b5e3c6f098f562fdae64c
SHA5129de8f6b68f28637ef4844df8914b926a3d7e90e3013b4aa4e871eda3e5d8d9525747541061f9e46528c1201a10bab520c763ad2dc5e841001eb5b24f077f79c7
-
Filesize
41KB
MD54c3dce52edaec8f5e3a7a8775623d669
SHA1e54587845bb153cade4c025d6519ace63d1ac92f
SHA256b4a33369d9f2b2a43196229106bd21bb4cada7aebf662fa369d65101856df9a9
SHA51270b1f49d8cc39272ef96a11c19d2a2a710bf976402c7091a47b396c476c05b113aadf8be45300477774a7ec8cc2d2e56ba953ea0a181dc934e2b766634dfcc9f