Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
155s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/03/2024, 15:33
Static task
static1
Behavioral task
behavioral1
Sample
c0f1c92a74f2e4d96f26f5f08963ec8e.exe
Resource
win7-20240221-en
General
-
Target
c0f1c92a74f2e4d96f26f5f08963ec8e.exe
-
Size
35KB
-
MD5
c0f1c92a74f2e4d96f26f5f08963ec8e
-
SHA1
8d143e96879e76898a3540b32d1423ea06c10136
-
SHA256
36fe0b9f08dcff684a786175cfb392e6749ea2618bc8ed8bfbb6b90cb76d5961
-
SHA512
26971a4c0544c7958e418eb5d466a5dff27cfaf606707ac5f094af9a2599ceb4ed863827b70ce391340e455d68d3794dfb9fe243e4a70f2e8420cf2c9d1d0eb2
-
SSDEEP
768:LLp41wWGI9sLAqFU+YW/ywFOoWhBQ8+YPeQ6:LLp41B9sLdK9OkhQd
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000\Control Panel\International\Geo\Nation c0f1c92a74f2e4d96f26f5f08963ec8e.exe -
Installs/modifies Browser Helper Object 2 TTPs 5 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects c0f1c92a74f2e4d96f26f5f08963ec8e.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C} c0f1c92a74f2e4d96f26f5f08963ec8e.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{31D09BA0-12F5-4CCE-BE8A-2923E76605DA} c0f1c92a74f2e4d96f26f5f08963ec8e.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{7361FADD-DCBB-4CAF-AB40-0232FBE02E94} c0f1c92a74f2e4d96f26f5f08963ec8e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{7361FADD-DCBB-4CAF-AB40-0232FBE02E94}\ = "Yahoo! Messenger" c0f1c92a74f2e4d96f26f5f08963ec8e.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\mssystem.dat c0f1c92a74f2e4d96f26f5f08963ec8e.exe File created C:\Windows\SysWOW64\msyahooea.dll c0f1c92a74f2e4d96f26f5f08963ec8e.exe File opened for modification C:\Windows\SysWOW64\msyahooea.dll c0f1c92a74f2e4d96f26f5f08963ec8e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000\Software\Microsoft\Internet Explorer\Main c0f1c92a74f2e4d96f26f5f08963ec8e.exe Set value (str) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000\SOFTWARE\Microsoft\Internet Explorer\Main\@#$E$@#n%^a&^%b#$%l^%$e^& %^&B#$%r&^%o$%w@#$s^%$e&*r(*& &*E*^&x$^%t%$#e@#$n&^%s#%i*^o$%^n(&*s%^& = "yes" c0f1c92a74f2e4d96f26f5f08963ec8e.exe -
Modifies registry class 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7361FADD-DCBB-4CAF-AB40-0232FBE02E94}\InProcServer32\ = "%SystemRoot%\\SysWow64\\msyahooea.dll" c0f1c92a74f2e4d96f26f5f08963ec8e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7361FADD-DCBB-4CAF-AB40-0232FBE02E94}\InProcServer32\ThreadingModel = "Apartment" c0f1c92a74f2e4d96f26f5f08963ec8e.exe Key created \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\WOW6432Node\CLSID c0f1c92a74f2e4d96f26f5f08963ec8e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7361FADD-DCBB-4CAF-AB40-0232FBE02E94} c0f1c92a74f2e4d96f26f5f08963ec8e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7361FADD-DCBB-4CAF-AB40-0232FBE02E94}\ = "Yahoo! Messenger" c0f1c92a74f2e4d96f26f5f08963ec8e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7361FADD-DCBB-4CAF-AB40-0232FBE02E94}\InProcServer32 c0f1c92a74f2e4d96f26f5f08963ec8e.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5100 wrote to memory of 4636 5100 c0f1c92a74f2e4d96f26f5f08963ec8e.exe 90 PID 5100 wrote to memory of 4636 5100 c0f1c92a74f2e4d96f26f5f08963ec8e.exe 90 PID 5100 wrote to memory of 4636 5100 c0f1c92a74f2e4d96f26f5f08963ec8e.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\c0f1c92a74f2e4d96f26f5f08963ec8e.exe"C:\Users\Admin\AppData\Local\Temp\c0f1c92a74f2e4d96f26f5f08963ec8e.exe"1⤵
- Checks computer location settings
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C system.bat2⤵PID:4636
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
111B
MD57844a3b91327c09974a966cb36b0f806
SHA1e67afb20f7e0111c7bc0b2c7ea521d83425f6a15
SHA2566d3fb11f4e715fee2fbfd4f7a5ef6a33cf3a481693e1c65a8533215495da9f6d
SHA512ea1c337ea34badaf06d56140837572435d9a05b8cc46c38d6c9d3bec287b422b1f70ebef1c7fb58cd1b2b79c082ab2669188b33d44c6b9161ec2caa007c1f5c9