Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/02/2024, 18:10

General

  • Target

    99cc674e13a8576ad88dd17ec98e9426.exe

  • Size

    611KB

  • MD5

    99cc674e13a8576ad88dd17ec98e9426

  • SHA1

    647107d0f1a4319f10376e83ec286a0f0bd5a949

  • SHA256

    5c29571473e307c8b3707f6aa2590779fcb9bcd4aff681ff49f05fc172d99a59

  • SHA512

    0b3c2a98faade7594423b1e808ab35dd6f603c4eba4373a3ad05e8566ac941e828dd01b5afded3328f1819d4a09861628460b1ec7d1d6c0b2b4e045c8fdd8d3c

  • SSDEEP

    12288:ZmNVdMxVxw6YzecXL0ZOd9eH0En7IOm2Xh0tmsuqf2M4GJh5UTk:ABswVCbZI9adXgoqf6eYTk

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 2 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 11 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\99cc674e13a8576ad88dd17ec98e9426.exe
    "C:\Users\Admin\AppData\Local\Temp\99cc674e13a8576ad88dd17ec98e9426.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Modifies Internet Explorer settings
    • Suspicious use of WriteProcessMemory
    PID:1496
    • C:\Program Files (x86)\AdvTopC\AdvTCApp.exe
      "C:\Program Files (x86)\AdvTopC\AdvTCApp.exe" /r
      2⤵
      • Executes dropped EXE
      • Modifies registry class
      PID:2744
    • C:\Windows\SysWOW64\regsvr32.exe
      "C:\Windows\System32\regsvr32.exe" /s "C:\Program Files (x86)\AdvTopC\TCHelper.dll"
      2⤵
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      PID:4508

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\AdvTopC\AdvTCApp.exe

    Filesize

    394KB

    MD5

    deec7b9c0e4e632b7c0b0cf74b7d2941

    SHA1

    fdf8d9b9ee6c0ba37f03197c18ad4305f7be88b8

    SHA256

    376552c201e989925c46526db823c00f16d5709b8d9474a35736aa528ce3b3bb

    SHA512

    93a18e70462ad468319e88ea3dc095a721699bb26e719f41d485ced53ed28216a35a134796a877df507ee316ebb5d5c85c5f8366fedc634807e1ce721a726319

  • C:\Program Files (x86)\AdvTopC\AdvTCApp.tlb

    Filesize

    3KB

    MD5

    665656ceda2660da436eb6c2c518473d

    SHA1

    6e2b6b6b2032a2b1ce1963af8480ab41143f6371

    SHA256

    ddeef9fc2836cc5916456129c1500c497b5d87e0d315f0297cbbea3661f27871

    SHA512

    3e0c86c304babd0447284721f6746aa6c01a08f13d7f8c49b16594a7260bba7ec7073a79918107eacf9b686dd32c006b4744fff8b8e6d553507444ff8254e7d3

  • C:\Program Files (x86)\AdvTopC\TCHelper.dll

    Filesize

    244KB

    MD5

    a4e15995cacb7bd5ec5c630653b3492a

    SHA1

    1f45575a04095061ad35c4dfc5d2716ae273be42

    SHA256

    be1a008d6ab6894ff9896ffa85404f9cf419c1b8952977687aa9bb6f24672139

    SHA512

    1d611fbe5f0f118b20cf159dbee18261e343d4b6addded484eb30b0b2782de29a1ae6cda80006e388eb3b993f416a958a822102416b9bd086a1d088104a0d072

  • C:\Program Files (x86)\AdvTopC\tcse.dat

    Filesize

    2KB

    MD5

    acd07c835403c841b9813ba15b5a6655

    SHA1

    79169ac4cef7ccc20f89269856ee7fbf83e8628c

    SHA256

    9d416b1228a0344ef57c973126e6f02169b4d1ad41c228b96acb664a68fdb499

    SHA512

    bef387f42a3e5eac3bf3181892e9766963efdf0915e319d95cccdeff7ab2369a2dfc6096b946121395a680449f7838ff65e3d5967ee6ab81ea659ae821e45207