Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28/02/2024, 11:18
Static task
static1
Behavioral task
behavioral1
Sample
abc15af4008e8832a0a6cc6c90bf1599.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
abc15af4008e8832a0a6cc6c90bf1599.exe
Resource
win10v2004-20240226-en
General
-
Target
abc15af4008e8832a0a6cc6c90bf1599.exe
-
Size
724KB
-
MD5
abc15af4008e8832a0a6cc6c90bf1599
-
SHA1
66ccce6161849dd40d20bf1b5b30f2ee4cd74bd2
-
SHA256
9b2b1e301bed2e080fb835aece6d2644b1ca3b5b673b34617bc6c0f378307d5a
-
SHA512
faf4ba5cf6f5782b9b4dea6e2320ef6dfc207c011682f03b90a3430b43844c18ca3b2634ff040783f7575f065794284968185d86639dec48c3fac3febf10a872
-
SSDEEP
12288:uxHjL99LsEONTlqagN59/2MzTcDYOtygo2ZJTaR6fHl6vKP2rUi6K6aKUUifD0:aL99wBTlqagH12OcDYOogo23WR6fJPSK
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation abc15af4008e8832a0a6cc6c90bf1599.exe -
Executes dropped EXE 3 IoCs
pid Process 4900 server_se.exe 64 ¼Ò³àsa.exe 4924 jgdvcl.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\jgdvcl.exe server_se.exe File opened for modification C:\Windows\SysWOW64\jgdvcl.exe server_se.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 38 IoCs
pid Process 4900 server_se.exe 4900 server_se.exe 4900 server_se.exe 4924 jgdvcl.exe 4924 jgdvcl.exe 4924 jgdvcl.exe 4924 jgdvcl.exe 4924 jgdvcl.exe 4924 jgdvcl.exe 4924 jgdvcl.exe 4924 jgdvcl.exe 4924 jgdvcl.exe 4924 jgdvcl.exe 4924 jgdvcl.exe 4924 jgdvcl.exe 4924 jgdvcl.exe 4924 jgdvcl.exe 4924 jgdvcl.exe 4924 jgdvcl.exe 4924 jgdvcl.exe 4924 jgdvcl.exe 4924 jgdvcl.exe 4924 jgdvcl.exe 4924 jgdvcl.exe 4924 jgdvcl.exe 4924 jgdvcl.exe 4924 jgdvcl.exe 4924 jgdvcl.exe 4924 jgdvcl.exe 4924 jgdvcl.exe 4924 jgdvcl.exe 4924 jgdvcl.exe 4924 jgdvcl.exe 4924 jgdvcl.exe 4924 jgdvcl.exe 4924 jgdvcl.exe 4924 jgdvcl.exe 4924 jgdvcl.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4900 server_se.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 5092 wrote to memory of 4900 5092 abc15af4008e8832a0a6cc6c90bf1599.exe 89 PID 5092 wrote to memory of 4900 5092 abc15af4008e8832a0a6cc6c90bf1599.exe 89 PID 5092 wrote to memory of 4900 5092 abc15af4008e8832a0a6cc6c90bf1599.exe 89 PID 5092 wrote to memory of 64 5092 abc15af4008e8832a0a6cc6c90bf1599.exe 91 PID 5092 wrote to memory of 64 5092 abc15af4008e8832a0a6cc6c90bf1599.exe 91 PID 5092 wrote to memory of 64 5092 abc15af4008e8832a0a6cc6c90bf1599.exe 91 PID 4900 wrote to memory of 1312 4900 server_se.exe 97 PID 4900 wrote to memory of 1312 4900 server_se.exe 97 PID 4900 wrote to memory of 1312 4900 server_se.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\abc15af4008e8832a0a6cc6c90bf1599.exe"C:\Users\Admin\AppData\Local\Temp\abc15af4008e8832a0a6cc6c90bf1599.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\server_se.exe"C:\server_se.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\SERVER~1.EXE > nul3⤵PID:1312
-
-
-
C:\¼Ò³àsa.exe"C:\¼Ò³àsa.exe"2⤵
- Executes dropped EXE
PID:64
-
-
C:\Windows\SysWOW64\jgdvcl.exeC:\Windows\SysWOW64\jgdvcl.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4924
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
721KB
MD5e94bd541111f718634e72721791dd25e
SHA188afeb012e06b22c8ef4644d38ddbd37d13d6e16
SHA25696eb6dcd413555efba50864f9f5941dc58f48826901efc387f887ee30d150314
SHA51264921297684cdf76467b251d99e04832cf0d5acd16eba2d32e3058471dcc99c16c55aa59be171c42452f1cf664b01e4db0156416eecb18cbeb814eac10428ed6
-
Filesize
1.0MB
MD525b839ba896917b0e8f29cb76daad781
SHA1ba5d8c46534c38fec877ac7f972fc53516f5d120
SHA2566914efea0c5bef4396dd9a548e5a12e21fa9ed7cdd4f5cd8ff5f3342510f292a
SHA5120fc51a1ceaa6fde84e5defc83e7d5e284bad9d84d34948a62c98ea9091123c7c00df28b347c545e0df0eb3151ba121acd64b9778c2fec2ab95ea22ac7cead084
-
Filesize
384KB
MD5ae2381b00c6fddd48a3aa2b2f6245df7
SHA1caa4b850ff9f0d9c4aaf4ba7cf4190594035799f
SHA2564d2fbd0727086715331680c06a2a79fd3ed1b003ea1386fab97f0d0fd878c653
SHA51222c6d2eaeb1b96320171377cdc49cb0713430ca85fdecde108730d0a21bc96c43c11b0680505d12632d42100ee7a214dd005d490c3706135368246ea16d2d1a5