Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/03/2024, 17:02
Static task
static1
Behavioral task
behavioral1
Sample
bc565ee9911ae05c2193e75bda324bb8.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bc565ee9911ae05c2193e75bda324bb8.exe
Resource
win10v2004-20240226-en
General
-
Target
bc565ee9911ae05c2193e75bda324bb8.exe
-
Size
21KB
-
MD5
bc565ee9911ae05c2193e75bda324bb8
-
SHA1
44d1d8d6d1aa950f1b9a86d96cbab845af946fbc
-
SHA256
f7f1f72bb19aab74e3f84b1c9cf1948838ea82b1e83a4e0c428a7642e0297dba
-
SHA512
25a2388ae83bb5c33ce3468f9346e585c6cddff8b54d36afa0944e049b5f913d27d7027035f80d2e42555489cdc0754c61ca3fd8abe26c8d434866ebff2c8041
-
SSDEEP
384:tQeC1XxcmEPX2UNUcHHynyrS7drJaKiw80sOrMgW5KNB/rj:mNhcmK28SnyGXaKtXeI
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" bc565ee9911ae05c2193e75bda324bb8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
pid Process 2492 taskkill.exe -
Modifies registry class 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IE bc565ee9911ae05c2193e75bda324bb8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IE\ = "????" bc565ee9911ae05c2193e75bda324bb8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IE\shell\open\command bc565ee9911ae05c2193e75bda324bb8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IE\DefaultIcon bc565ee9911ae05c2193e75bda324bb8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IE\DefaultIcon\ = "C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE,0" bc565ee9911ae05c2193e75bda324bb8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.IE bc565ee9911ae05c2193e75bda324bb8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.IE\ = "IE" bc565ee9911ae05c2193e75bda324bb8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IE\shell bc565ee9911ae05c2193e75bda324bb8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IE\shell\open bc565ee9911ae05c2193e75bda324bb8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IE\shell\open\command\ = "C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE " bc565ee9911ae05c2193e75bda324bb8.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4716 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1544 bc565ee9911ae05c2193e75bda324bb8.exe 1544 bc565ee9911ae05c2193e75bda324bb8.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1544 bc565ee9911ae05c2193e75bda324bb8.exe Token: SeDebugPrivilege 2492 taskkill.exe Token: SeDebugPrivilege 1544 bc565ee9911ae05c2193e75bda324bb8.exe Token: SeDebugPrivilege 1544 bc565ee9911ae05c2193e75bda324bb8.exe Token: SeDebugPrivilege 1544 bc565ee9911ae05c2193e75bda324bb8.exe Token: SeDebugPrivilege 1544 bc565ee9911ae05c2193e75bda324bb8.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1544 bc565ee9911ae05c2193e75bda324bb8.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1544 wrote to memory of 2492 1544 bc565ee9911ae05c2193e75bda324bb8.exe 88 PID 1544 wrote to memory of 2492 1544 bc565ee9911ae05c2193e75bda324bb8.exe 88 PID 1544 wrote to memory of 2492 1544 bc565ee9911ae05c2193e75bda324bb8.exe 88 PID 1544 wrote to memory of 2744 1544 bc565ee9911ae05c2193e75bda324bb8.exe 91 PID 1544 wrote to memory of 2744 1544 bc565ee9911ae05c2193e75bda324bb8.exe 91 PID 1544 wrote to memory of 2744 1544 bc565ee9911ae05c2193e75bda324bb8.exe 91 PID 2744 wrote to memory of 4716 2744 cmd.exe 94 PID 2744 wrote to memory of 4716 2744 cmd.exe 94 PID 2744 wrote to memory of 4716 2744 cmd.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc565ee9911ae05c2193e75bda324bb8.exe"C:\Users\Admin\AppData\Local\Temp\bc565ee9911ae05c2193e75bda324bb8.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im ZhuDongFangyu.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2492
-
-
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 1 && del "C:\Users\Admin\AppData\Local\Temp\bc565ee9911ae05c2193e75bda324bb8.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 13⤵
- Runs ping.exe
PID:4716
-
-