Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/03/2024, 00:50

General

  • Target

    c7441e08aa4bde63f234a7c674ead91a.exe

  • Size

    2.0MB

  • MD5

    c7441e08aa4bde63f234a7c674ead91a

  • SHA1

    38159e227cc992a79b0210d8a39df4a2677692b1

  • SHA256

    bcf4da127174d250938aa4e070a58803d9efe82127af5e0aca2c860ed8bad7ff

  • SHA512

    8620a7b79ceb4879de78061144903fe3345dacd64a23e871d424b8b215bd71fdee8e3255a0b6bce5b2b8fde8a1aa3d25356c22c93d9d97b2eb531994193ece03

  • SSDEEP

    49152:OFUcx88PWPOpX0SFhxmf8kIcyQD7tDmrwx+iqCRIyGc:O+K88uPCHjxmFIrQDJDlgf+IyGc

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c7441e08aa4bde63f234a7c674ead91a.exe
    "C:\Users\Admin\AppData\Local\Temp\c7441e08aa4bde63f234a7c674ead91a.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3200
    • C:\Users\Admin\AppData\Local\Temp\444C.tmp
      "C:\Users\Admin\AppData\Local\Temp\444C.tmp" --splashC:\Users\Admin\AppData\Local\Temp\c7441e08aa4bde63f234a7c674ead91a.exe 4FF42BF484DA920F278B7A2E212419F6960F58D8391A996A46B104FDEC3396A8BDED02C7E8EF07A8E11610A5B7461C2DEE8570CF79ECD618D808F9FA07B2E91A
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Modifies registry class
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:4068
      • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
        "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\c7441e08aa4bde63f234a7c674ead91a.docx" /o ""
        3⤵
        • Checks processor information in registry
        • Enumerates system info in registry
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of SetWindowsHookEx
        PID:920

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\444C.tmp

    Filesize

    1.1MB

    MD5

    6841aca27393946e17ddc2d352422b76

    SHA1

    41e18bb1fedee267b3e811aa247f87a0aa0d01e1

    SHA256

    d5e1ab8f70f2f64a7c1066253d4f13b8989cd96e4ecd0e331354bcda92127fb2

    SHA512

    a58dd67d71473c0ca55d0f7ab8567bb09bfda4221481591db83c4c97f20ce92d48aac47ede04ac62defc8b42a3d40c3c799fad96294195d09dde0ebac5cad75f

  • C:\Users\Admin\AppData\Local\Temp\444C.tmp

    Filesize

    1024KB

    MD5

    dc94bb69d89c25ede3d8146e94d51d38

    SHA1

    ea220eaf05a08b6f5e0f016ee8d3cf64794b5b65

    SHA256

    2e2f80cd45ebc2c5dee1460028a0b0072542efe695be5a0646557fadd79f3b57

    SHA512

    31943ea50e39fba90f1ef39ae5ce5befbbe33ad068ee8a8d48f26a1c40a61153639fae5130160ecbcb75ee7b926c01c35750c95ea37dc7527fd8376c65f44ec8

  • C:\Users\Admin\AppData\Local\Temp\c7441e08aa4bde63f234a7c674ead91a.docx

    Filesize

    19KB

    MD5

    4046ff080673cffac6529512b8d3bdbb

    SHA1

    d3cbc39065b7a55e995fa25397da2140bdac80c1

    SHA256

    f0c1b360c0b24b5450a79138650e6ee254afae6ce8f6c68da7d1f32f91582680

    SHA512

    453f70730b7560e3d3e23ddfa0fe74e014753f8b34b45254c1c0cf5fec0546a2b8b109a4f9d096e91711b6d02cb383a7136c2cb7bd6600d0598acf7c90c25418

  • memory/920-16-0x00007FFB281B0000-0x00007FFB281C0000-memory.dmp

    Filesize

    64KB

  • memory/920-18-0x00007FFB68130000-0x00007FFB68325000-memory.dmp

    Filesize

    2.0MB

  • memory/920-11-0x00007FFB281B0000-0x00007FFB281C0000-memory.dmp

    Filesize

    64KB

  • memory/920-13-0x00007FFB68130000-0x00007FFB68325000-memory.dmp

    Filesize

    2.0MB

  • memory/920-14-0x00007FFB281B0000-0x00007FFB281C0000-memory.dmp

    Filesize

    64KB

  • memory/920-12-0x00007FFB281B0000-0x00007FFB281C0000-memory.dmp

    Filesize

    64KB

  • memory/920-15-0x00007FFB68130000-0x00007FFB68325000-memory.dmp

    Filesize

    2.0MB

  • memory/920-40-0x00007FFB68130000-0x00007FFB68325000-memory.dmp

    Filesize

    2.0MB

  • memory/920-17-0x00007FFB281B0000-0x00007FFB281C0000-memory.dmp

    Filesize

    64KB

  • memory/920-39-0x00007FFB68130000-0x00007FFB68325000-memory.dmp

    Filesize

    2.0MB

  • memory/920-19-0x00007FFB68130000-0x00007FFB68325000-memory.dmp

    Filesize

    2.0MB

  • memory/920-20-0x00007FFB68130000-0x00007FFB68325000-memory.dmp

    Filesize

    2.0MB

  • memory/920-21-0x00007FFB68130000-0x00007FFB68325000-memory.dmp

    Filesize

    2.0MB

  • memory/920-22-0x00007FFB68130000-0x00007FFB68325000-memory.dmp

    Filesize

    2.0MB

  • memory/920-23-0x00007FFB68130000-0x00007FFB68325000-memory.dmp

    Filesize

    2.0MB

  • memory/920-24-0x00007FFB260F0000-0x00007FFB26100000-memory.dmp

    Filesize

    64KB

  • memory/920-25-0x00007FFB68130000-0x00007FFB68325000-memory.dmp

    Filesize

    2.0MB

  • memory/920-26-0x00007FFB260F0000-0x00007FFB26100000-memory.dmp

    Filesize

    64KB

  • memory/3200-0-0x0000000000400000-0x0000000000606000-memory.dmp

    Filesize

    2.0MB

  • memory/4068-5-0x0000000000400000-0x0000000000606000-memory.dmp

    Filesize

    2.0MB