Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
154s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
14/03/2024, 01:37
Static task
static1
Behavioral task
behavioral1
Sample
3b65f173cfe40322076c4479a52c1bcb.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3b65f173cfe40322076c4479a52c1bcb.exe
Resource
win10v2004-20240226-en
General
-
Target
3b65f173cfe40322076c4479a52c1bcb.exe
-
Size
328KB
-
MD5
3b65f173cfe40322076c4479a52c1bcb
-
SHA1
a6be1d9c608cb52a824d1dc8c17fb15398157216
-
SHA256
444ad5599a673e1b0ae5ca8cfa261ab076f3d669d8d33556bc6b3b9b38f1c2c4
-
SHA512
f5fc1275fb632c09471c2c9b3e26a2b3d24925435c1925cbfafe12c83dd6bd4cea5807a483045f76edb480ce5eb545c752395491bc3b9254955000a284ddcf16
-
SSDEEP
6144:e2+JS2sFafI8U0obHCW/2a7XQcsPMjVWrG89gkPzDh1v:e2TFafJiHCWBWPMjVWrXf1v
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 3b65f173cfe40322076c4479a52c1bcb.exe -
Executes dropped EXE 2 IoCs
pid Process 4376 sidebar2.exe 792 sidebar2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 30 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\DefaultIcon\ = "%1" 3b65f173cfe40322076c4479a52c1bcb.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\shell\open\command 3b65f173cfe40322076c4479a52c1bcb.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\shell\open 3b65f173cfe40322076c4479a52c1bcb.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\prochost\Content-Type = "application/x-msdownload" 3b65f173cfe40322076c4479a52c1bcb.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\prochost\shell 3b65f173cfe40322076c4479a52c1bcb.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\prochost\shell\runas\command\ = "\"%1\" %*" 3b65f173cfe40322076c4479a52c1bcb.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe 3b65f173cfe40322076c4479a52c1bcb.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\prochost\ = "Application" 3b65f173cfe40322076c4479a52c1bcb.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\DefaultIcon 3b65f173cfe40322076c4479a52c1bcb.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings 3b65f173cfe40322076c4479a52c1bcb.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" 3b65f173cfe40322076c4479a52c1bcb.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\prochost\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SysWOW_32\\sidebar2.exe\" /START \"%1\" %*" 3b65f173cfe40322076c4479a52c1bcb.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\prochost\shell\runas\command 3b65f173cfe40322076c4479a52c1bcb.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\shell 3b65f173cfe40322076c4479a52c1bcb.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" 3b65f173cfe40322076c4479a52c1bcb.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\prochost\shell\open\command 3b65f173cfe40322076c4479a52c1bcb.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\prochost\shell\open 3b65f173cfe40322076c4479a52c1bcb.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\shell\runas\command 3b65f173cfe40322076c4479a52c1bcb.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\prochost 3b65f173cfe40322076c4479a52c1bcb.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\prochost\DefaultIcon\ = "%1" 3b65f173cfe40322076c4479a52c1bcb.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SysWOW_32\\sidebar2.exe\" /START \"%1\" %*" 3b65f173cfe40322076c4479a52c1bcb.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\Content-Type = "application/x-msdownload" 3b65f173cfe40322076c4479a52c1bcb.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\shell\runas 3b65f173cfe40322076c4479a52c1bcb.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\prochost\shell\runas 3b65f173cfe40322076c4479a52c1bcb.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\prochost\shell\runas\command\IsolatedCommand = "\"%1\" %*" 3b65f173cfe40322076c4479a52c1bcb.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\shell\runas\command\ = "\"%1\" %*" 3b65f173cfe40322076c4479a52c1bcb.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\prochost\DefaultIcon 3b65f173cfe40322076c4479a52c1bcb.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\prochost\shell\open\command\IsolatedCommand = "\"%1\" %*" 3b65f173cfe40322076c4479a52c1bcb.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\ = "prochost" 3b65f173cfe40322076c4479a52c1bcb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 3b65f173cfe40322076c4479a52c1bcb.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4376 sidebar2.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 912 wrote to memory of 4376 912 3b65f173cfe40322076c4479a52c1bcb.exe 105 PID 912 wrote to memory of 4376 912 3b65f173cfe40322076c4479a52c1bcb.exe 105 PID 912 wrote to memory of 4376 912 3b65f173cfe40322076c4479a52c1bcb.exe 105 PID 4376 wrote to memory of 792 4376 sidebar2.exe 106 PID 4376 wrote to memory of 792 4376 sidebar2.exe 106 PID 4376 wrote to memory of 792 4376 sidebar2.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b65f173cfe40322076c4479a52c1bcb.exe"C:\Users\Admin\AppData\Local\Temp\3b65f173cfe40322076c4479a52c1bcb.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\sidebar2.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\sidebar2.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\sidebar2.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\sidebar2.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\sidebar2.exe"3⤵
- Executes dropped EXE
PID:792
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1416 --field-trial-handle=3240,i,13319578961094268484,16557498665191861597,262144 --variations-seed-version /prefetch:81⤵PID:2788
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
328KB
MD56978df7e9504532c8ecb2ab7d8516a52
SHA1a24724c02f47be755b6f7a6c12c6141d3b89ef35
SHA25649ba9171ea6fc789be3f1cfb32d9faaffa5b81fb02539d62c43fed02543a55b3
SHA51218a412619213ee4c14df62f4d19c998f387b2e7bf08e19444063756782af63a2115c7e1cb4137734866da87e9616983860ace2013a78335a3b815e30d349904b