Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

25/02/2025, 18:31

250225-w51ava1jt9 8

11/03/2024, 23:35

240311-3leclahf51 8

05/09/2023, 14:57

230905-sbr6lagd82 8

12/04/2023, 00:00

230412-aaqx2ahh3w 8

Analysis

  • max time kernel
    150s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/03/2024, 23:35

General

  • Target

    Elo.exe

  • Size

    96KB

  • MD5

    26b12d61e9e62412748069275521be1a

  • SHA1

    6206f2f1256774a058998da3517cbffc5e70270e

  • SHA256

    a6f48afd03aaa15824a2182e20088a4595f795766f78d679416d123ec17e1de5

  • SHA512

    0e28b335d373c7d1d92f15bd412886472db66ad9b1ab9a4fcae6f1338df07785a62b03ff069aea9543a850c95e9990e3107e0114d63f207721e897b859956491

  • SSDEEP

    1536:f7fbN3eEDhDPA/pICdUkbBtW7upvaLU0bI5taxKo0IOlnToIfswociK1CFOU:T7DhdC6kzWypvaQ0FxyNTBfspwYp

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Delays execution with timeout.exe 1 IoCs
  • Modifies registry class 4 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs
  • Views/modifies file attributes 1 TTPs 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Elo.exe
    "C:\Users\Admin\AppData\Local\Temp\Elo.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2604
    • C:\Windows\system32\cmd.exe
      "C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\6551.tmp\6552.tmp\6553.bat C:\Users\Admin\AppData\Local\Temp\Elo.exe"
      2⤵
      • Checks computer location settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:5024
      • C:\Windows\system32\net.exe
        net session
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4356
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 session
          4⤵
            PID:3152
        • C:\Windows\system32\attrib.exe
          attrib +h +s C:\Users\Admin\AppData\Local\Temp\Elo.exe
          3⤵
          • Views/modifies file attributes
          PID:2824
        • C:\Windows\system32\attrib.exe
          attrib +h +s 12843.vbs
          3⤵
          • Views/modifies file attributes
          PID:3816
        • C:\Windows\system32\attrib.exe
          attrib +h +s 18107.vbs
          3⤵
          • Views/modifies file attributes
          PID:3968
        • C:\Windows\system32\attrib.exe
          attrib +h +s 24302.vbs
          3⤵
          • Views/modifies file attributes
          PID:528
        • C:\Windows\system32\attrib.exe
          attrib +h +s Automate.bat
          3⤵
          • Views/modifies file attributes
          PID:1656
        • C:\Windows\system32\attrib.exe
          attrib +h +s Test.vbs
          3⤵
          • Views/modifies file attributes
          PID:2308
        • C:\Windows\system32\attrib.exe
          attrib +h +s Test.bat
          3⤵
          • Views/modifies file attributes
          PID:4324
        • C:\Windows\system32\attrib.exe
          attrib +h +s Detect.vbs
          3⤵
          • Views/modifies file attributes
          PID:3688
        • C:\Windows\system32\attrib.exe
          attrib +h +s Detect.bat
          3⤵
          • Views/modifies file attributes
          PID:5112
        • C:\Windows\system32\attrib.exe
          attrib +h +s bsod.bat
          3⤵
          • Views/modifies file attributes
          PID:2616
        • C:\Windows\System32\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\12843.vbs"
          3⤵
          • Checks computer location settings
          • Suspicious use of WriteProcessMemory
          PID:4360
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Start-Process Detect.bat -Verb RunAs -windowstyle hidden
            4⤵
            • Modifies registry class
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4172
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Detect.bat"
              5⤵
              • Checks computer location settings
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:4676
              • C:\Windows\System32\WScript.exe
                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Detect.vbs"
                6⤵
                • Checks computer location settings
                • Suspicious use of WriteProcessMemory
                PID:3652
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Start-Process Test.bat -Verb RunAs -windowstyle hidden -wait
                  7⤵
                  • Modifies registry class
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:3596
                  • C:\Windows\System32\cmd.exe
                    "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Test.bat"
                    8⤵
                      PID:4584
                • C:\Windows\System32\WScript.exe
                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Test.vbs"
                  6⤵
                    PID:4308
            • C:\Windows\system32\NOTEPAD.EXE
              "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\MEMZ.txt
              3⤵
              • Opens file in notepad (likely ransom note)
              • Suspicious use of FindShellTrayWindow
              PID:316
            • C:\Windows\system32\attrib.exe
              attrib +h +s MEMZ.txt
              3⤵
              • Views/modifies file attributes
              PID:4856
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" type NirCmd.ps1 "
              3⤵
                PID:1360
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell.exe -noprofile -
                3⤵
                • Blocklisted process makes network request
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:792
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell gci -Recurse -Filter *.zip |ForEach-Object {Expand-Archive -Path $_.Fullname -DestinationPath $_.BaseName -Force}
                3⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:3448
              • C:\Windows\system32\timeout.exe
                timeout 15 /nobreak
                3⤵
                • Delays execution with timeout.exe
                PID:1876

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

            Filesize

            64B

            MD5

            a6c9d692ed2826ecb12c09356e69cc09

            SHA1

            def728a6138cf083d8a7c61337f3c9dade41a37f

            SHA256

            a07d329eb9b4105ba442c89f7cfa0d7b263f9f0617e26df93cf8cdc8dc94d57b

            SHA512

            2f27d2b241ce34f988c39e17ca5a1ebe628ac6c1b8ee8df121db9ad8929eaadf5f24ad66457591cccf87e60d2ba2eab88af860ab9c323a5c2a9867045d6e7ba3

          • C:\Users\Admin\AppData\Local\Temp\12843.vbs

            Filesize

            128B

            MD5

            de77acb4970462a84d1418426ef768c0

            SHA1

            9f9420eecfda1a228b31ba6a7a7cac2a2885d59e

            SHA256

            533d3759b2dc9f801b1440002bbe45a19099d87378faa7cd1ca38b6ed15c91cf

            SHA512

            c9bd51a8f42d51e4ecf3b699aaf5c907fb85d4c727f376677604f7bac369740a13953631c4164c988707e64494c8ecb7164074b782ce2a544220b1abd0aef0dc

          • C:\Users\Admin\AppData\Local\Temp\18107.vbs

            Filesize

            147B

            MD5

            9e058306bf7f9c484a7553dcd1a080ad

            SHA1

            98670b4b9c36eea14078343272418104aee382c0

            SHA256

            245c3a8cf02aa38b997b3a4eea47b1872c68d882a2e63c19e142b5f3e72a9d0c

            SHA512

            bd4455afc947671eae07099d026124aeeda1c2f0ecac05f1fdf48bbe7ad2213d42dc797282cf1e7a206232d2463d8765944e6e9db8ce5c404f64b6d0c6f16fa0

          • C:\Users\Admin\AppData\Local\Temp\24302.vbs

            Filesize

            218B

            MD5

            a5ffacb76079366b573d25fec3dccf7f

            SHA1

            5039dc66332fdade2b16d3b9065fb5fc9061f6ba

            SHA256

            24ab295f3ea0d46fc827398c8b1d3b23752de36c8100bcfc4b5f011915b4f4f8

            SHA512

            85b40e401e88dd13f84ec781956980c59ccb338f3953240da0be5bf17ce7d42d1654cada7e8fc70a52a2a1befb697f7ad63622c2f97f7659d481e315fb4f1046

          • C:\Users\Admin\AppData\Local\Temp\6551.tmp\6552.tmp\6553.bat

            Filesize

            7KB

            MD5

            481a357d27e7c1a2cfbe617f14600b8b

            SHA1

            5c29901995a3d345eaa0d3cc9ee763ec21638b89

            SHA256

            970b56f67e1996e434fc45c12b5157fb96ae4886b3ea4e77fad2e86fc78321aa

            SHA512

            3504010edfa0f8a17b888fdaa1631c5a2efc20a5689bb8cc06fe1a6a95067cc1ebd6ef52d2ea8c52867b7e16280292972025358beccf0937313822c6199b2bfd

          • C:\Users\Admin\AppData\Local\Temp\Automate.bat

            Filesize

            250B

            MD5

            a187be5a642072020b80b3d8e0dc5660

            SHA1

            fbe6fa62460c84dd3a90fb65495af5c649bcd86b

            SHA256

            f13d29ab1414bf030eb8c545228610bd74db73188f8da80491ab25e5291e481f

            SHA512

            1af2aa4f93089a0a7be671fcf9ab9ca8fecb53e8b4f823e3c64f23f660fd60b845b3c02bceeb3faf5d1193e82008c7565c5f63a2b71794138909c3221008f6f0

          • C:\Users\Admin\AppData\Local\Temp\Detect.bat

            Filesize

            111B

            MD5

            3cb76846869bcbb44cebf7c7e4c6218c

            SHA1

            6d05544d37255fff5b838d3f3b7e0113fbb67c03

            SHA256

            a6c5a78cb4cb2427005933c394abc76ed075e3c7fb996e14802b306a7838bcf2

            SHA512

            a6017cccc5692992bcd9069f4593d3d56af9146628d9716daa0a663941a22522d2fe265dc1bc727b9eaeef1b06027c6d2b077db9ee2ea73802621ff89c980e58

          • C:\Users\Admin\AppData\Local\Temp\Detect.vbs

            Filesize

            220B

            MD5

            0ba0411f0d555bebb7752316e799f779

            SHA1

            4bdc902ee5300a65a4bad277f2a8b0175da7674d

            SHA256

            d7c456e54e9a5621b7df7cce19994ac3dd348ee98b086ae43112348c7935da06

            SHA512

            6738b93630327a2c2ef326abc4b896533523c602d57cd8a2305b151efd1e727938f6afce4e090e92d74964a01d748666a24847d537caf46e1a562c98927f9275

          • C:\Users\Admin\AppData\Local\Temp\MEMZ.txt

            Filesize

            202B

            MD5

            c6e2a6fe68bdcf28fd4632bcdea5a8ee

            SHA1

            4b8239cdafbba61992260695dc0e5249e37cb18c

            SHA256

            1a790c636b4b92759ff47ea50792fec9d7da67d2764b49d64644fc562c35a908

            SHA512

            0115a40e16647873223d6450b00b2168a00282b6decebbd92722a64c9625bdfa79bc65645e8fe021f76201f72a78c46676037953ea2918114e26b1076a912067

          • C:\Users\Admin\AppData\Local\Temp\NirCmd.ps1

            Filesize

            104B

            MD5

            66f27c86f734b28d170f3c4e1db8958e

            SHA1

            25557a67a5dc675e518e1bd83b32d346cc95025c

            SHA256

            1e9a3e5b03f1f763274fd17b8f5c64e2629923dd0c9cfc94865eadef9c69e90b

            SHA512

            f793c9742586e3150974e490c849dd0ed7a6a57e31d7affcc02406662e81378218991e6dbe63105db01cf7c352f1e76b4e71249fe8781a880258f9e9cab7fd7d

          • C:\Users\Admin\AppData\Local\Temp\Test.bat

            Filesize

            18B

            MD5

            e57a11eb25dd25ed755c1839d0e4a9b7

            SHA1

            e26d908081f93f2f28cef5091fd43a3ca1920dcf

            SHA256

            c196c15d05b0197ea127877380a5001d6b294083c4fd92e62be55438e6a7bdff

            SHA512

            1e2b50c39b67f0f1ac0cec2126817b033355147923ae8303b82ea9e19194820e9796c5cbff4af4f89683b471f4b7262dbd3953bdd7d87bfcd2cdaaf0991ad607

          • C:\Users\Admin\AppData\Local\Temp\Test.vbs

            Filesize

            10B

            MD5

            7aba77b3cbdf0b7c78cee71d55dd6f50

            SHA1

            e1c06f4fc0029aa239aa2a8d5d6a0ec6bbd89516

            SHA256

            9b972e91c3c303336561ca43420e9a808c34812246b9fe6d85c22bf005254e3a

            SHA512

            d6e8770db9f96c32dc76fa2d8a78f50a24938be6e2aabd3214080a4db0ec497ec5ce6ae1b481d8b0bb442779812e7222e435d8f5e6b5dd763c46a959a4c14f34

          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_oho2ednr.zlh.ps1

            Filesize

            60B

            MD5

            d17fe0a3f47be24a6453e9ef58c94641

            SHA1

            6ab83620379fc69f80c0242105ddffd7d98d5d9d

            SHA256

            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

            SHA512

            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

          • C:\Users\Admin\AppData\Local\Temp\bsod.bat

            Filesize

            40B

            MD5

            e9ca92728d880c80a242d55390769d37

            SHA1

            c82e73e41912b3543150d2f8e520b77e66c64876

            SHA256

            a67f7e91a028d2695cdacf984b5fd2f33ee90e95d84467df1e33a94e3573e19e

            SHA512

            70fc9d051486e2ec964baefedf4fb8959baa3dee74887028dd4ff4337ecf0f70012c9eec855f1a65e9f141d3b76d9c616039a292e779ce690f1e191397eb088c

          • memory/792-109-0x00007FF84B5E0000-0x00007FF84C0A1000-memory.dmp

            Filesize

            10.8MB

          • memory/792-89-0x000001E4FC050000-0x000001E4FC094000-memory.dmp

            Filesize

            272KB

          • memory/792-84-0x000001E4E16F0000-0x000001E4E1700000-memory.dmp

            Filesize

            64KB

          • memory/792-87-0x000001E4E16F0000-0x000001E4E1700000-memory.dmp

            Filesize

            64KB

          • memory/792-82-0x00007FF84B5E0000-0x00007FF84C0A1000-memory.dmp

            Filesize

            10.8MB

          • memory/792-63-0x000001E4E1730000-0x000001E4E1752000-memory.dmp

            Filesize

            136KB

          • memory/792-90-0x000001E4FC120000-0x000001E4FC196000-memory.dmp

            Filesize

            472KB

          • memory/792-83-0x000001E4E16F0000-0x000001E4E1700000-memory.dmp

            Filesize

            64KB

          • memory/792-106-0x000001E4FC950000-0x000001E4FD0F6000-memory.dmp

            Filesize

            7.6MB

          • memory/3448-123-0x00007FF84B5E0000-0x00007FF84C0A1000-memory.dmp

            Filesize

            10.8MB

          • memory/3448-110-0x00007FF84B5E0000-0x00007FF84C0A1000-memory.dmp

            Filesize

            10.8MB

          • memory/3448-112-0x000001ED7A990000-0x000001ED7A9A0000-memory.dmp

            Filesize

            64KB

          • memory/3448-111-0x000001ED7A990000-0x000001ED7A9A0000-memory.dmp

            Filesize

            64KB

          • memory/3596-94-0x00000267A9420000-0x00000267A9430000-memory.dmp

            Filesize

            64KB

          • memory/3596-95-0x00000267A9420000-0x00000267A9430000-memory.dmp

            Filesize

            64KB

          • memory/3596-93-0x00007FF84B5E0000-0x00007FF84C0A1000-memory.dmp

            Filesize

            10.8MB

          • memory/3596-124-0x00007FF84B5E0000-0x00007FF84C0A1000-memory.dmp

            Filesize

            10.8MB

          • memory/3596-125-0x00000267A9420000-0x00000267A9430000-memory.dmp

            Filesize

            64KB

          • memory/3596-126-0x00000267A9420000-0x00000267A9430000-memory.dmp

            Filesize

            64KB

          • memory/3596-127-0x00000267A9420000-0x00000267A9430000-memory.dmp

            Filesize

            64KB

          • memory/4172-85-0x0000023B0AA20000-0x0000023B0AA30000-memory.dmp

            Filesize

            64KB

          • memory/4172-92-0x00007FF84B5E0000-0x00007FF84C0A1000-memory.dmp

            Filesize

            10.8MB

          • memory/4172-88-0x00007FF84B5E0000-0x00007FF84C0A1000-memory.dmp

            Filesize

            10.8MB

          • memory/4172-86-0x0000023B0AA20000-0x0000023B0AA30000-memory.dmp

            Filesize

            64KB