Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    131s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/02/2024, 10:48

General

  • Target

    a1ad43760d7a2edb0f7fbc3b9cdc6e9e.exe

  • Size

    387KB

  • MD5

    a1ad43760d7a2edb0f7fbc3b9cdc6e9e

  • SHA1

    b55d0ccb64a65bd608dafd27d6d57bf6fdb49267

  • SHA256

    c40fe14a6a93721e76c9a11fa65e07509a91050c34287f822be74116e1635ed6

  • SHA512

    d92c2d970f7880b1179f9d5c22725b466bed45f92ec37efda6bf48cb47bc06bd64b7d0387876368f3df7c597214ba6178c30a79a99174bd522ef5e2abe6b6676

  • SSDEEP

    6144:gknN4CVUIm6uk06ZLYgvBA+8xmrxgmA+3cclptVopAfC:FnNhuBoY8SorxgmA+nlvVlfC

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies security service 2 TTPs 2 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Disables Task Manager via registry modification
  • Disables use of System Restore points 1 TTPs
  • Sets file execution options in registry 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • UPX packed file 17 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • AutoIT Executable 15 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops autorun.inf file 1 TTPs 4 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies Internet Explorer start page 1 TTPs 1 IoCs
  • Modifies registry class 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs
  • System policy modification 1 TTPs 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a1ad43760d7a2edb0f7fbc3b9cdc6e9e.exe
    "C:\Users\Admin\AppData\Local\Temp\a1ad43760d7a2edb0f7fbc3b9cdc6e9e.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies security service
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Disables RegEdit via registry modification
    • Sets file execution options in registry
    • Checks computer location settings
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops autorun.inf file
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies Internet Explorer start page
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2296
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /C net stop "Security Center"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4972
      • C:\Windows\SysWOW64\net.exe
        net stop "Security Center"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1660
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop "Security Center"
          4⤵
            PID:2228
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /C net stop "Windows Firewall/Internet Connection Sharing (ICS)"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3368
        • C:\Windows\SysWOW64\net.exe
          net stop "Windows Firewall/Internet Connection Sharing (ICS)"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2216
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Windows Firewall/Internet Connection Sharing (ICS)"
            4⤵
              PID:516
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /C AT /delete /yes
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1140
          • C:\Windows\SysWOW64\at.exe
            AT /delete /yes
            3⤵
              PID:2360
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /C AT 12:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\iexplorer.exe
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:2696
            • C:\Windows\SysWOW64\at.exe
              AT 12:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\iexplorer.exe
              3⤵
                PID:4076

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Autorun.inf

            Filesize

            280B

            MD5

            ba9fa2ff95cf51c5e241551ed3eef925

            SHA1

            e3025f0a039f861dd04101aae9c120f85fe3a707

            SHA256

            be203907c52ec704c53a4179b9cbb87e0a12724d9b3e5c22e36cbf18abba13b1

            SHA512

            59274af7c19ddf587d796090fa34a90300df62e9e6fc2bf16f4bcdb7553b58b6e7429426cd98ea632106fd19adc706bc91acd86b4ac8ce5081f13552aac96272

          • C:\ProgramData\Exe_Debuger.ini

            Filesize

            1KB

            MD5

            06582b59bda74b3a65d7024034b4ea3d

            SHA1

            464f0f8d4c7d72eca4d95d9d5c3ee4a8cfd6196c

            SHA256

            8dfd74d9c3b9446430eec61c174ec852d7b1abfefb48fd0936b9516863c1a11d

            SHA512

            656819c944c21a45bf51dad46b8e7e0950d1af7f8538d5962f0d07d336aea2a34a5943e00b88c393489955b806808711b0690d377e0819581e91b1375792bb3e

          • C:\ProgramData\windows-update.exe

            Filesize

            1KB

            MD5

            32852fa83396724dd914fcf76420e59a

            SHA1

            96a591219004fdf544f721b12dada3c8740deb7d

            SHA256

            fc2fe3ab2c34a367e24e587fd814956b2bae6e9133161d8bd5ffa302f75767ae

            SHA512

            9af95a259e514b958cc3749c4567c4281537c160975ca71e17c77b1ac5d1a04c6cbdc753ffe0700b5aa1d9697db39ccae438b3fd377a0574196df53263fab972

          • C:\Windows\SysWOW64\iexplorer.exe

            Filesize

            387KB

            MD5

            a1ad43760d7a2edb0f7fbc3b9cdc6e9e

            SHA1

            b55d0ccb64a65bd608dafd27d6d57bf6fdb49267

            SHA256

            c40fe14a6a93721e76c9a11fa65e07509a91050c34287f822be74116e1635ed6

            SHA512

            d92c2d970f7880b1179f9d5c22725b466bed45f92ec37efda6bf48cb47bc06bd64b7d0387876368f3df7c597214ba6178c30a79a99174bd522ef5e2abe6b6676

          • memory/2296-74-0x0000000000400000-0x00000000004CE000-memory.dmp

            Filesize

            824KB

          • memory/2296-69-0x0000000000400000-0x00000000004CE000-memory.dmp

            Filesize

            824KB

          • memory/2296-70-0x0000000000400000-0x00000000004CE000-memory.dmp

            Filesize

            824KB

          • memory/2296-71-0x0000000000400000-0x00000000004CE000-memory.dmp

            Filesize

            824KB

          • memory/2296-72-0x0000000000400000-0x00000000004CE000-memory.dmp

            Filesize

            824KB

          • memory/2296-73-0x0000000000400000-0x00000000004CE000-memory.dmp

            Filesize

            824KB

          • memory/2296-0-0x0000000000400000-0x00000000004CE000-memory.dmp

            Filesize

            824KB

          • memory/2296-76-0x0000000000400000-0x00000000004CE000-memory.dmp

            Filesize

            824KB

          • memory/2296-77-0x0000000000400000-0x00000000004CE000-memory.dmp

            Filesize

            824KB

          • memory/2296-78-0x0000000000400000-0x00000000004CE000-memory.dmp

            Filesize

            824KB

          • memory/2296-79-0x0000000000400000-0x00000000004CE000-memory.dmp

            Filesize

            824KB

          • memory/2296-80-0x0000000000400000-0x00000000004CE000-memory.dmp

            Filesize

            824KB

          • memory/2296-81-0x0000000000400000-0x00000000004CE000-memory.dmp

            Filesize

            824KB

          • memory/2296-82-0x0000000000400000-0x00000000004CE000-memory.dmp

            Filesize

            824KB

          • memory/2296-83-0x0000000000400000-0x00000000004CE000-memory.dmp

            Filesize

            824KB

          • memory/2296-84-0x0000000000400000-0x00000000004CE000-memory.dmp

            Filesize

            824KB