Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/03/2024, 21:48

General

  • Target

    b846797239f53087160e9ad02fbf675e.exe

  • Size

    70KB

  • MD5

    b846797239f53087160e9ad02fbf675e

  • SHA1

    55dd7659bb2587888eea0459680cff3f7b95032f

  • SHA256

    3a44787d2cb3d19a2482dc745fe9c6fa4633deaabe9d1fb302f9166ff11fb345

  • SHA512

    4da45fc7b7d3249389dc2541b4d760cd58291d1c01d93bc368d6072c97215c4444300d4aa69f79f7d09d5340eb3b9935c645cd4bfe0972667dda2406a1f8778d

  • SSDEEP

    1536:jvqz89m+363/7AbwLYtAFFW9yciOigri2X8dIJhlBwOUrBjlSNCSDRoqx:jvqz89m+363/7AbwLYtcFkTiQ8mdUZq3

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 33 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b846797239f53087160e9ad02fbf675e.exe
    "C:\Users\Admin\AppData\Local\Temp\b846797239f53087160e9ad02fbf675e.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3920
    • C:\Users\Admin\AppData\Local\Temp\b846797239f53087160e9ad02fbf675e.exe
      "C:\Users\Admin\AppData\Local\Temp\b846797239f53087160e9ad02fbf675e.exe" C:\Users\Admin\AppData\Local\Temp\b846797239f53087160e9ad02fbf675e.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3788
    • C:\Program Files (x86)\Adobe\acrotray.exe
      "C:\Program Files (x86)\Adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\b846797239f53087160e9ad02fbf675e.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3932
      • C:\Program Files (x86)\Adobe\acrotray.exe
        "C:\Program Files (x86)\Adobe\acrotray.exe" C:\Program Files (x86)\Adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\b846797239f53087160e9ad02fbf675e.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1804
      • C:\Program Files (x86)\Adobe\acrotray .exe
        "C:\Program Files (x86)\Adobe\acrotray .exe" C:\Program Files (x86)\Adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\b846797239f53087160e9ad02fbf675e.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:836
        • C:\Program Files (x86)\Adobe\acrotray .exe
          "C:\Program Files (x86)\Adobe\acrotray .exe" C:\Program Files (x86)\Adobe\acrotray .exe" C:\Program Files (x86)\Adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\b846797239f53087160e9ad02fbf675e.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4444
  • C:\Program Files (x86)\Internet Explorer\ielowutil.exe
    "C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding
    1⤵
      PID:688
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1816
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1816 CREDAT:17410 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:672
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1816 CREDAT:17416 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:4680
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1816 CREDAT:17424 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:4340

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Adobe\acrotray .exe

      Filesize

      107KB

      MD5

      111b011be30e53818aa8ceb230eaf920

      SHA1

      499e2a5e24e8e76fafe0bb1be157650834b66971

      SHA256

      58b993dc6811dffe4f5fd7089b66076234d5a9f7e6b93fa3d0e937e03338193f

      SHA512

      9ebbdf517616c2c5e20f6e37655943122477bf934bf05822a25497231e0f4d1d332ea64a8af8922a25a6411b30e649031e26a19d7c37d42a2eddf903804770da

    • C:\Program Files (x86)\Adobe\acrotray.exe

      Filesize

      78KB

      MD5

      4c979a52d734b4b9366fa650d9b566e3

      SHA1

      4814bdb93be89b3bf43fe22910d0fd766896bcbb

      SHA256

      72c324fd6065f49041e94e4467d8bfe2c39e1512670b9699a799bda0ac4002b3

      SHA512

      b62c07da154486a2d2f896f725445915fe28065dee5acafac2429d41a8fc19c1aab5569179909d380122b00e79630515894388a72336f56cf43119e893af8574

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\IGS2C121\bcBNaQRUG[1].js

      Filesize

      32KB

      MD5

      155aa791940dc8c525a4dbab4d8dbc0a

      SHA1

      9320dba4977ec5b99f1bbd6c396a9a972c215886

      SHA256

      763e602ef7c13af2dd7289d1290b1219e0bbfb6dbab56a46c8965970947a466b

      SHA512

      0bb005bf1b1aea41bc1dffbaeba6ea4f66a09bf789bff805c71859853e2ea756952776fd2cffb71f2c4b44e2fe894f1785d42374a85f3f9c19e45853b9572153

    • memory/3920-0-0x0000000010000000-0x0000000010010000-memory.dmp

      Filesize

      64KB