Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    136s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/03/2024, 05:35

General

  • Target

    cd3e2e5db407027a2e220895e56cea9d.exe

  • Size

    1.2MB

  • MD5

    cd3e2e5db407027a2e220895e56cea9d

  • SHA1

    9b7f73950140ffe44faf303d9f939ffe0e831ca1

  • SHA256

    9c9043fc217ad2dffc662e74354280936d9295735ee186db5912ee43db62c8fc

  • SHA512

    cb13555db384feaf62c64840d368147f37dc2227f2161782cfaa39a4ab08b2bd910e8ce07ac0f5b4e35ebe8d50ab1c10add111d1a08fb2a17e9cc06a4f25566b

  • SSDEEP

    24576:vXSdS7fpASLVbL/9qPmlNqfsOFxibcN0VsNHxz6K6m4:PSd+fqebLwPoJmfNJT2/m4

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 6 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cd3e2e5db407027a2e220895e56cea9d.exe
    "C:\Users\Admin\AppData\Local\Temp\cd3e2e5db407027a2e220895e56cea9d.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3144
    • C:\Users\Admin\AppData\Local\Temp\cd3e2e5db407027a2e220895e56cea9d.exe
      2⤵
      • Checks computer location settings
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:4524
      • C:\Windows\SysWOW64\CFAAQI\KGH.exe
        "C:\Windows\system32\CFAAQI\KGH.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Drops file in System32 directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:4840

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\CFAAQI\AKV.exe

    Filesize

    500KB

    MD5

    5a45ea24cce078dcf28664856734565d

    SHA1

    7e38e0649eae4b0f382c182d0483d9e4c0be26fa

    SHA256

    385f990c5fb25dc42a5f5a1128c8d20b9956a0790461c62c56607600c8ba7d5a

    SHA512

    7c466effc080db3c082a3a81cd22a1ee039104ebc9588921124490ceab84b2d5c1b1f4f82dfba95114661311276448297946296b2c4ad9d55cee2e3b710c12e5

  • C:\Windows\SysWOW64\CFAAQI\KGH.001

    Filesize

    69KB

    MD5

    c7fbfdd2d7ded71b4b6281efa26eeede

    SHA1

    f2f31ff2fab0c96ce978543ec741c6c82dfb7dbc

    SHA256

    f06fc708de125585f9bfb0c768e1d76f24b6e888875aafdc8c2b670663492737

    SHA512

    768cd3f899c7d68b426a5bcb5befd4570032ded9a40ceb0cbde618c23016c59e32b03b6b6963b207f7e58621fca2e3ea6d144c1457f69a0b9ef94ed03e83d041

  • C:\Windows\SysWOW64\CFAAQI\KGH.002

    Filesize

    54KB

    MD5

    e7879e2f301a885bb46ec1782a6d6278

    SHA1

    1aa00ac15c7748432b448be0f8a0d760222024bd

    SHA256

    9a65b644da2a50ebebaab51c46e8748587d08aaad64102c3df19d996d12dfcef

    SHA512

    7aa02f3bc0e87ea1afb0b42664891e5198b38796b3fac0deaeff0e92c59892b8a5b985e5d834c713868818a1be6f82cebabab1ac79a286f88c1d57452143a8ed

  • C:\Windows\SysWOW64\CFAAQI\KGH.004

    Filesize

    1KB

    MD5

    9cdba6e525eeadada6af06e4ab9ec298

    SHA1

    ccf4ffcdc78831eb7b6496f231aa5ec1aa1b8322

    SHA256

    4ed9987cae8b95355a54056363e14c2bd2d7c5717cceb6a23dd9061cf53ba776

    SHA512

    94f7519f5c34cc7bdd3a1d55b050a8dffefffaad018deb4aa955569bbdfd8922425aa6dc60db50d0e0235e0e9296a9d2d20e94be02b5a374219f088e04608b91

  • C:\Windows\SysWOW64\CFAAQI\KGH.exe

    Filesize

    1.7MB

    MD5

    e4bb483573e6bc82f09578f0b48324a5

    SHA1

    9a60cf20d832af49fb8ae6c484d0f39028d93d04

    SHA256

    30b3f04eb8b0820b33c8bc50c159ade06a4a29e4361f917b13bdd9323f4a3127

    SHA512

    8461aefddde57e467601928789f301c0c5bc42e7c7e4aaaf2dcb7ac6a2aea0d5be51db3daf6c9b11f1d78304de72ae8cf71dd8697d636db4f1767a8f8c6ab35b

  • memory/4524-3-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/4524-4-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/4524-5-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/4524-6-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/4524-19-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/4840-25-0x0000000000660000-0x0000000000661000-memory.dmp

    Filesize

    4KB