Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
162s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19/03/2024, 21:42
Static task
static1
Behavioral task
behavioral1
Sample
78b1f1335b9a822fb5e9e24c70b3eb87f229f3383f1f9db67fafec43abf19dbb.exe
Resource
win7-20240221-en
General
-
Target
78b1f1335b9a822fb5e9e24c70b3eb87f229f3383f1f9db67fafec43abf19dbb.exe
-
Size
336KB
-
MD5
25c58eb932724a40ba440ab0da42c526
-
SHA1
8fb69b4b550599d0a4d9a50b07ad43a5bc461dc9
-
SHA256
78b1f1335b9a822fb5e9e24c70b3eb87f229f3383f1f9db67fafec43abf19dbb
-
SHA512
d96f098b0e951d26c4fb440e11c0bfe0e3d8971c9da157cc7cbdacf6c666cfe3ceecf1ecaa9c7a559181d1ce3137e2bd37fb376dc89099c03300c7b7395c156e
-
SSDEEP
6144:GLtOexihqv4m+lXD6betiTuBMTWjIDIiUBAkW9UOKMOtzWO8CatspddOE:GL1D+IatauBML42MykRa6j
Malware Config
Extracted
urelas
218.54.31.165
218.54.31.226
Signatures
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 78b1f1335b9a822fb5e9e24c70b3eb87f229f3383f1f9db67fafec43abf19dbb.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation xoobn.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation hihyvy.exe -
Executes dropped EXE 3 IoCs
pid Process 968 xoobn.exe 3560 hihyvy.exe 2152 uvzyv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2152 uvzyv.exe 2152 uvzyv.exe 2152 uvzyv.exe 2152 uvzyv.exe 2152 uvzyv.exe 2152 uvzyv.exe 2152 uvzyv.exe 2152 uvzyv.exe 2152 uvzyv.exe 2152 uvzyv.exe 2152 uvzyv.exe 2152 uvzyv.exe 2152 uvzyv.exe 2152 uvzyv.exe 2152 uvzyv.exe 2152 uvzyv.exe 2152 uvzyv.exe 2152 uvzyv.exe 2152 uvzyv.exe 2152 uvzyv.exe 2152 uvzyv.exe 2152 uvzyv.exe 2152 uvzyv.exe 2152 uvzyv.exe 2152 uvzyv.exe 2152 uvzyv.exe 2152 uvzyv.exe 2152 uvzyv.exe 2152 uvzyv.exe 2152 uvzyv.exe 2152 uvzyv.exe 2152 uvzyv.exe 2152 uvzyv.exe 2152 uvzyv.exe 2152 uvzyv.exe 2152 uvzyv.exe 2152 uvzyv.exe 2152 uvzyv.exe 2152 uvzyv.exe 2152 uvzyv.exe 2152 uvzyv.exe 2152 uvzyv.exe 2152 uvzyv.exe 2152 uvzyv.exe 2152 uvzyv.exe 2152 uvzyv.exe 2152 uvzyv.exe 2152 uvzyv.exe 2152 uvzyv.exe 2152 uvzyv.exe 2152 uvzyv.exe 2152 uvzyv.exe 2152 uvzyv.exe 2152 uvzyv.exe 2152 uvzyv.exe 2152 uvzyv.exe 2152 uvzyv.exe 2152 uvzyv.exe 2152 uvzyv.exe 2152 uvzyv.exe 2152 uvzyv.exe 2152 uvzyv.exe 2152 uvzyv.exe 2152 uvzyv.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1628 wrote to memory of 968 1628 78b1f1335b9a822fb5e9e24c70b3eb87f229f3383f1f9db67fafec43abf19dbb.exe 96 PID 1628 wrote to memory of 968 1628 78b1f1335b9a822fb5e9e24c70b3eb87f229f3383f1f9db67fafec43abf19dbb.exe 96 PID 1628 wrote to memory of 968 1628 78b1f1335b9a822fb5e9e24c70b3eb87f229f3383f1f9db67fafec43abf19dbb.exe 96 PID 1628 wrote to memory of 2760 1628 78b1f1335b9a822fb5e9e24c70b3eb87f229f3383f1f9db67fafec43abf19dbb.exe 97 PID 1628 wrote to memory of 2760 1628 78b1f1335b9a822fb5e9e24c70b3eb87f229f3383f1f9db67fafec43abf19dbb.exe 97 PID 1628 wrote to memory of 2760 1628 78b1f1335b9a822fb5e9e24c70b3eb87f229f3383f1f9db67fafec43abf19dbb.exe 97 PID 968 wrote to memory of 3560 968 xoobn.exe 99 PID 968 wrote to memory of 3560 968 xoobn.exe 99 PID 968 wrote to memory of 3560 968 xoobn.exe 99 PID 3560 wrote to memory of 2152 3560 hihyvy.exe 113 PID 3560 wrote to memory of 2152 3560 hihyvy.exe 113 PID 3560 wrote to memory of 2152 3560 hihyvy.exe 113 PID 3560 wrote to memory of 1784 3560 hihyvy.exe 114 PID 3560 wrote to memory of 1784 3560 hihyvy.exe 114 PID 3560 wrote to memory of 1784 3560 hihyvy.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\78b1f1335b9a822fb5e9e24c70b3eb87f229f3383f1f9db67fafec43abf19dbb.exe"C:\Users\Admin\AppData\Local\Temp\78b1f1335b9a822fb5e9e24c70b3eb87f229f3383f1f9db67fafec43abf19dbb.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\xoobn.exe"C:\Users\Admin\AppData\Local\Temp\xoobn.exe" hi2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Users\Admin\AppData\Local\Temp\hihyvy.exe"C:\Users\Admin\AppData\Local\Temp\hihyvy.exe" OK3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3560 -
C:\Users\Admin\AppData\Local\Temp\uvzyv.exe"C:\Users\Admin\AppData\Local\Temp\uvzyv.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2152
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "4⤵PID:1784
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "2⤵PID:2760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1408 --field-trial-handle=2276,i,5697607538120380977,9987005253899555344,262144 --variations-seed-version /prefetch:81⤵PID:4820
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD5d6e2a6cb1d0783111ea2a0fa14bae8b9
SHA1c0eeda318dfeac00d9449551286dde86a103a9b2
SHA256b71439d31a9d550e481d69dc9e7be766616c91be6d9d4135e28cf8c3f08d2dcb
SHA51245c92191a15b90961968f07b520cff8bace442449d637b30b8c72697f01a34800808b40cceba297f9d5c259f708ad5b67a380cb7903edc2c5bf0291a3f72114d
-
Filesize
224B
MD5bfca78cf772b7f5c02f4afa27542f039
SHA191f726184edc3c9b8ea43cae9bcbaffbfea0a206
SHA2567f7acbc6121e55191303f51c3ca5af2069b2878421c5ea3d94495b44d1525d97
SHA512e17ee29f0db7b2afe82eff48a12b112d33c55f5103215cda92e2d7ac5b779f3b8d481efc80ffd08e47a54c6399822a659461011915c5a4f13ce46d77509e2da4
-
Filesize
512B
MD5a33647fd5e5b7915cdf6e9523ab45cd1
SHA1e4069e0e1ee3ea7d1398a0df40bfcf7d8d206e3d
SHA256d4acd6efe7505f380f900b35ff031364f11005aa4f5cbd17ce133cff2940996d
SHA512ed1818bfcdae0db369cd543242f424a6dfe3b8221e9949188ad44c92c5649926667eb8d3da344672d8b79a47174208fbef1356327b58a1bf52f57f5e148c3623
-
Filesize
336KB
MD5cff6ddfc40e7581e16827e1bbd3ecf82
SHA186286fcb7f297f98a588cf468f7dc58a4545822f
SHA256c96d6bc2d795303959be1fbeef4a5473aeaf5e3e91c32b837721f11ce156c46d
SHA512387068351a1834ae9480d3ab859606f7ea472afa16f8c24d9b6a74e6111702969de03c08e60d1fd12316d1375c72577084fd8f514c1cf111e06c7287d8376d73
-
Filesize
223KB
MD543a112a19dfa20fb99889a67237041ec
SHA1b79acc0c8ca5a14239c21cbe66a6f47d820f894f
SHA2566b92552fe98666a4ada8df09e8b79d8209aaff77da7330bf2c99e6ac58626931
SHA51220efebbd32a4df9f5017ce8a440a85c0ba989efa04d1e04840f9e59b0b62ddfd6e098ce68fd26d90019aeb6109bf69cd800645e4e83f0c0a31f44a85f746a072
-
Filesize
336KB
MD5402c9774e236ed0d3144985eca466cd4
SHA12182d4dafeb1554cbf210c23ff96f2b398a36f5c
SHA2565f9f961a824657f11ea2399e1aea46d60383e56f8df4aac8c99cd1645d3284b4
SHA51263af0ca2dd5168a349092ca9d80137098c90d60424e1300934747efea42f12f616e5dbb945de7d4f590d5e8a7c1ec2533d39c0962548c7d97af19e5c89ff9e18