Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/03/2024, 06:18

General

  • Target

    SecuriteInfo.com.W32.Agent_AGen.ABZ.tr.30631.16009.exe

  • Size

    435KB

  • MD5

    2ff5504c8b803e79dade34401c89701d

  • SHA1

    87d626130cfcb4f3984a4b7ab74f956fe4f13b60

  • SHA256

    ee6411869e495253cbbfc96932f262dbe199277a319aad8654c30f54534da109

  • SHA512

    c2c11c0075efb5b2a72cb10ad17221482790b0081fdefb1512df8cddfe7f50aa13a22d9e654c4461109ff8c5063cb3f49e5f890afce2c2f0e46d5117895d74d2

  • SSDEEP

    12288:TDr0C0xkXVXvNxeNOo2nLNsllllJsllllhi:TDr0C0xkXVXiNMnL4

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 3 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 24 IoCs
  • Drops file in Windows directory 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies data under HKEY_USERS 59 IoCs
  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 16 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.W32.Agent_AGen.ABZ.tr.30631.16009.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.W32.Agent_AGen.ABZ.tr.30631.16009.exe"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1424
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Public\Documents\Koino\ManualLauncher\AnySupport\HOST_GOV1\RACE\Install.cmd"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4008
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /S /D /c" ver "
        3⤵
          PID:2408
        • C:\Windows\SysWOW64\find.exe
          find "5.0"
          3⤵
            PID:4960
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" ver "
            3⤵
              PID:5020
            • C:\Windows\SysWOW64\find.exe
              find "5.1"
              3⤵
                PID:3592
              • C:\Users\Public\Documents\Koino\ManualLauncher\AnySupport\HOST_GOV1\RACE\MirrInst64.exe
                "C:\Users\Public\Documents\Koino\ManualLauncher\AnySupport\HOST_GOV1\RACE\MirrInst64.exe" -i "dfmirage" "Mirage Driver" "C:\Users\Public\Documents\Koino\ManualLauncher\AnySupport\HOST_GOV1\RACE\105\" "C:\Users\Public\Documents\Koino\ManualLauncher\AnySupport\HOST_GOV1\RACE\105\dfmirage.inf"
                3⤵
                • Executes dropped EXE
                • Drops file in System32 directory
                • Drops file in Windows directory
                • Checks SCSI registry key(s)
                • Suspicious use of AdjustPrivilegeToken
                PID:3284
          • C:\Windows\system32\svchost.exe
            C:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall
            1⤵
            • Drops file in Windows directory
            • Checks SCSI registry key(s)
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4028
            • C:\Windows\system32\DrvInst.exe
              DrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{871512c5-eda1-2847-9755-5ef8a4a3e50d}\dfmirage.inf" "9" "4fc89b15f" "0000000000000148" "WinSta0\Default" "0000000000000144" "208" "C:\Users\Public\Documents\Koino\ManualLauncher\AnySupport\HOST_GOV1\RACE\105"
              2⤵
              • Drops file in System32 directory
              • Drops file in Windows directory
              • Checks SCSI registry key(s)
              • Modifies data under HKEY_USERS
              PID:4596
            • C:\Windows\system32\DrvInst.exe
              DrvInst.exe "2" "211" "ROOT\DISPLAY\0000" "C:\Windows\INF\oem3.inf" "oem3.inf:db3e5b3e044cf517:DFMirage:2.0.105.0:dfmirage," "470102fe7" "0000000000000158"
              2⤵
              • Drops file in Drivers directory
              • Drops file in System32 directory
              • Drops file in Windows directory
              • Checks SCSI registry key(s)
              • Suspicious use of AdjustPrivilegeToken
              PID:1132
          • C:\Windows\system32\dwm.exe
            "dwm.exe"
            1⤵
            • Checks SCSI registry key(s)
            • Enumerates system info in registry
            • Modifies data under HKEY_USERS
            • Suspicious use of AdjustPrivilegeToken
            PID:2020

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Public\Documents\Koino\MANUAL~1\ANYSUP~1\HOST_G~1\RACE\105\dfmirage.cat

            Filesize

            11KB

            MD5

            964bd2583871d246f0a01ca9e51abd9d

            SHA1

            a871efcba882911684e39a6220557a2d3e7e5cc5

            SHA256

            28200fbd0236e2b1ab2d0d615d45c1672ee4f4b7521fcaae52f7225eb124303c

            SHA512

            1e91007a578b3da6ea278f5d61cb60e91e16077df2f68bf47424bb76175c12b88c003aee3e3b639510f61f20d22596cfb61bbe516383d02df546eea67a6409a9

          • C:\Users\Public\Documents\Koino\MANUAL~1\ANYSUP~1\HOST_G~1\RACE\105\x64\dfmirage.dll

            Filesize

            39KB

            MD5

            4e7cd3d45fe3c9c60a8163c66de156cc

            SHA1

            0a6278e6ec7c4c3a75ec25cc47d19f643cee4927

            SHA256

            87308c9b7ecd835c7ae58a3eb6e5b8474977a420e5e3c978b798ff8d175779f1

            SHA512

            bbc4bf06fcb45efac7ac41a9d5fd8c7b1601c9a948966c250677e2e6793d6d56bd1a87854387a81b3ad7b70ad39573f4a14a345bbd1c119ee7af9beb4f6b0cd7

          • C:\Users\Public\Documents\Koino\MANUAL~1\ANYSUP~1\HOST_G~1\RACE\105\x64\dfmirage.sys

            Filesize

            35KB

            MD5

            178a6e9a0dce42959fc5ad129f60cba9

            SHA1

            f1f29ad0ac605d4afda852f57401d762ab20b49b

            SHA256

            215cb36c6178d47caa6600b4ca7036dceff412141be4511ed7220a1831820355

            SHA512

            f6af4d204b49f4d5ad84d64f9ccb2676a8a2ba51794e0220beeda7dd5d7702200b3c04f7d5a8290f3f7f24cfb1036a87aba2a829137fbf54fd904f36d0bcd5f4

          • C:\Users\Public\Documents\Koino\ManualLauncher\AnySupport\HOST_GOV1\RACE\105\dfmirage.inf

            Filesize

            2KB

            MD5

            fca869ed2e4441a235ee85ef3c35e92f

            SHA1

            f8710a2bfc7091b909ef990f18e70630b3ddea84

            SHA256

            71aa40b8a284ea119da69dfcc2e1bf79eda0a1696c09934c93ea2109ca806c4f

            SHA512

            8df3820fa92dd7acb70d2ecb09a38fc262ad6acae97a4dd7fb1594fb02aa0ea9e175c373aa536dc5e063cf4e9b6f82e4c107a1551781fe03571c259579094601

          • C:\Users\Public\Documents\Koino\ManualLauncher\AnySupport\HOST_GOV1\RACE\Install.cmd

            Filesize

            899B

            MD5

            e5b4d641c72c9938595a4fd224e6ad1f

            SHA1

            222bee618179b66437e0d9c4be3a52b159eeef06

            SHA256

            6dd2494e7619d54ab4c817b5f0933d0b0ac90a6781d79d0d76b9b190bbb1f74c

            SHA512

            d3712675bf26af6762406b3fe2a1bebccc0187a93ad3752c8845a2a50462297657221aa655671c4048e5114cfc5a3fd3665b6c84f9af7373af7f30242e6021d7

          • C:\Users\Public\Documents\Koino\ManualLauncher\AnySupport\HOST_GOV1\RACE\MirrInst64.exe

            Filesize

            155KB

            MD5

            f6e2d04ee7babdb2dfd80e6c5b79724c

            SHA1

            25c35e90ad036ef69d57041293401328187b209c

            SHA256

            27e90fb741b042c3ea596b8323f42fec9fd6432a24efa0d3553cfcf381eebca9

            SHA512

            61be219951000bf95393129a97f19dfdf3f94159d097c6f20a6aef991b8f1d3b8e0533ba33e0cae647c48962d9aa5b385e5934b62b514b175e398c5d64665a94