Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    35s
  • max time network
    31s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/02/2024, 18:30

General

  • Target

    student.exe

  • Size

    5.1MB

  • MD5

    8748891eb1584c4502a15577d3075d41

  • SHA1

    e0304bd87d1e7516ca6f49d8896fa8498b830ab5

  • SHA256

    f2167589cc58e0bbb31100da792d13a9bcb8e98e511aa2405e896223a11ddabd

  • SHA512

    a2c46761b31050f319f55d6e2de35ee59f22d427e9edf2f7a7061922aeafde44b56cdc6165e0523d01f21dacf20013d6eb10ce1b4627134b6d8e866de9169024

  • SSDEEP

    98304:Rx9iA5FR7kozLG5k4iugdOsmX6Xpcvy3r3MKpeGVxG06Puy+1M:Rx935FJfzLjunX6XpmGVwyy+G

Score
10/10

Malware Config

Signatures

  • Modifies firewall policy service 2 TTPs 4 IoCs
  • Disables Task Manager via registry modification
  • Modifies Windows Firewall 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 20 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\student.exe
    "C:\Users\Admin\AppData\Local\Temp\student.exe"
    1⤵
    • Modifies firewall policy service
    • Checks computer location settings
    • Enumerates connected drives
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5080
    • C:\Windows\SysWOW64\NETSH.EXE
      "C:\Windows\SYSTEM32\NETSH.EXE" advfirewall firewall delete rule name="LanSchool Student"
      2⤵
      • Modifies Windows Firewall
      PID:2908
    • C:\Windows\SysWOW64\NETSH.EXE
      "C:\Windows\SYSTEM32\NETSH.EXE" advfirewall firewall add rule name="LanSchool Student" dir=in program="C:\Users\Admin\AppData\Local\Temp\student.exe" action=allow
      2⤵
      • Modifies Windows Firewall
      PID:3516

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads