Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10/03/2024, 07:48
Static task
static1
Behavioral task
behavioral1
Sample
Keygen.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Keygen.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
Mocha.Telnet.v3.2.XScale.Smartphone200x.Incl.Keygen-SyMPDA/Keygen.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Mocha.Telnet.v3.2.XScale.Smartphone200x.Incl.Keygen-SyMPDA/Keygen.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
Mocha.Telnet.v3.2.XScale.Smartphone200x.Incl.Keygen-SyMPDA/sym-wmsmtelnetsp.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
Mocha.Telnet.v3.2.XScale.Smartphone200x.Incl.Keygen-SyMPDA/sym-wmsmtelnetsp.exe
Resource
win10v2004-20240226-en
General
-
Target
Keygen.exe
-
Size
20KB
-
MD5
bda654eb40ad8f5eb14bf3b931a71270
-
SHA1
202fa0ac769e7dfde7861584237127d4108ea3c0
-
SHA256
291550e0bbf532a0cc0c5bfea5e6f24c084372ef52a02be09deac769d5cb7297
-
SHA512
f603227def1e86bcf7cb4f2b285617836f652646dc06e18cf007fb4a327c5d19ffff132b68b27dab8567bedbfbd546c3993c005c674c5a28157cdb7c79a1b045
-
SSDEEP
384:WU45yYGoUmCt0SFI0EU8wl35KO/tFdR1FpyqgJn28:Wr8oPCRF58wl35KO/tFdR1KZJn9
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe rundll32.exe hjdt.qto etmbw" Keygen.exe -
Deletes itself 1 IoCs
pid Process 1388 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 2188 Keygen.exe 1388 svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\hjdt.qto Keygen.exe File opened for modification C:\Windows\SysWOW64\hjdt.qto Keygen.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\idid svchost.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3048 WINWORD.EXE 3048 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2188 Keygen.exe 2188 Keygen.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2188 Keygen.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3048 WINWORD.EXE 3048 WINWORD.EXE 3048 WINWORD.EXE 3048 WINWORD.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2188 wrote to memory of 1388 2188 Keygen.exe 102 PID 2188 wrote to memory of 1388 2188 Keygen.exe 102 PID 2188 wrote to memory of 1388 2188 Keygen.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\Keygen.exe"C:\Users\Admin\AppData\Local\Temp\Keygen.exe"1⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Deletes itself
- Loads dropped DLL
- Modifies registry class
PID:1388
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /Automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3048
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21KB
MD502940c74780ec9acf42351982efeb65a
SHA127546acf0a8e4b00ba2caa4e386c994d0d0e57f6
SHA256bb93dc2435c167434ed6b5458f2dd5360d498198968dce995d4f4696bf74bc2a
SHA512ec7b63f5732df051598c6d7c62c16412ce41c5586651a55ca406f0d2e63fe487dbd54cfba125b8510373c5e9952acabe644f86006ba8f42ea42a101dfe2d6061