Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/03/2024, 23:01

General

  • Target

    9d70d735277becc8ea809fd811195ab27c5fbae131713f02a03a3b42926cd67a.exe

  • Size

    188KB

  • MD5

    8f815c34a19a388c510029ef10124f80

  • SHA1

    bedf77970ccc1337eae90ea960d3d3bb0e620348

  • SHA256

    9d70d735277becc8ea809fd811195ab27c5fbae131713f02a03a3b42926cd67a

  • SHA512

    42c52407e3c2dd9b3aba6d662ed8900fe92ca1dac8ddf7cfa62c150f2cee177468fb1e1f021c37a5fb5adae3e54df3b082f63a97bdef6d46649870b0c44c5eae

  • SSDEEP

    3072:K7fyA+M5ROnFG5pY0hrDGILpLI0M/Dk4KrfXRdjnbk9bOlezfQnFTTvprw1Wf8W6:K76A+YCKs0tzXRdjbk9bbyvprww0W

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9d70d735277becc8ea809fd811195ab27c5fbae131713f02a03a3b42926cd67a.exe
    "C:\Users\Admin\AppData\Local\Temp\9d70d735277becc8ea809fd811195ab27c5fbae131713f02a03a3b42926cd67a.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1316
    • C:\Users\Admin\mausou.exe
      "C:\Users\Admin\mausou.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2548
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4460 --field-trial-handle=3016,i,1323102786462900035,7687994236215859601,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:5056

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\mausou.exe

      Filesize

      188KB

      MD5

      dcc7dfefae1c5b0eb8716b221cfb2c51

      SHA1

      7783abe5d86fbe060eed368543a4a7bd849e77f7

      SHA256

      c33f100c23dc9c0a015fd8bc0946c06f0cb21ffec9fa6f8c707195dbc5056758

      SHA512

      11f709f4fd112cd6d16b64ff2be35a1040b94e25dcf95946c25be5725bf4973766b4e89aea298d9474815f3afa3c63a5f697c2ea52dd0d11db3241370072f041