Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26/03/2024, 04:11
Static task
static1
Behavioral task
behavioral1
Sample
ca99d487a7ff3f5dbadb7abf5513f82d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ca99d487a7ff3f5dbadb7abf5513f82d.exe
Resource
win10v2004-20240226-en
General
-
Target
ca99d487a7ff3f5dbadb7abf5513f82d.exe
-
Size
462KB
-
MD5
ca99d487a7ff3f5dbadb7abf5513f82d
-
SHA1
f81f5b4520abe15f6878b656ae7adbcd08852217
-
SHA256
6a9029349a53fc4f664ec86fe75ab618e7a76524f7dc2037d9ea0719bba311f8
-
SHA512
fcef575d069015c6646c8b0f47e41eb2bd61ce303d1839096d6a04a9cac653fab56058d8c88d84d40758f06b653ed67e32887c0a25d6e78837750c72fa41e00e
-
SSDEEP
12288:loJe5X8bz7ZU9qqzVcztzAb1onikQsJuj:loJw8bzK9T31onmsJu
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation 7EB5.tmp -
Executes dropped EXE 1 IoCs
pid Process 3752 7EB5.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000_Classes\Local Settings 7EB5.tmp -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3124 WINWORD.EXE 3124 WINWORD.EXE -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3752 7EB5.tmp -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 3124 WINWORD.EXE 3124 WINWORD.EXE 3124 WINWORD.EXE 3124 WINWORD.EXE 3124 WINWORD.EXE 3124 WINWORD.EXE 3124 WINWORD.EXE 3124 WINWORD.EXE 3124 WINWORD.EXE 3124 WINWORD.EXE -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2012 wrote to memory of 3752 2012 ca99d487a7ff3f5dbadb7abf5513f82d.exe 88 PID 2012 wrote to memory of 3752 2012 ca99d487a7ff3f5dbadb7abf5513f82d.exe 88 PID 2012 wrote to memory of 3752 2012 ca99d487a7ff3f5dbadb7abf5513f82d.exe 88 PID 3752 wrote to memory of 3124 3752 7EB5.tmp 93 PID 3752 wrote to memory of 3124 3752 7EB5.tmp 93 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca99d487a7ff3f5dbadb7abf5513f82d.exe"C:\Users\Admin\AppData\Local\Temp\ca99d487a7ff3f5dbadb7abf5513f82d.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\7EB5.tmp"C:\Users\Admin\AppData\Local\Temp\7EB5.tmp" --helpC:\Users\Admin\AppData\Local\Temp\ca99d487a7ff3f5dbadb7abf5513f82d.exe 983D82552FC5DE2FBDBCB8165226227F4FBBEADE07471EFDBBDAB308F2EE556F4E908EFB7F306CFE3BC78BB32C9A10F91927D2CB5BDE87CACC2AB7DF98A5795B2⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\ca99d487a7ff3f5dbadb7abf5513f82d.docx" /o ""3⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3124
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
462KB
MD597dffeb85704953fcd5c8fe060ff3a74
SHA1f802c11b0ee74efe7b9c89b5029d748aceda94f8
SHA2563cb83c39fffcff5a10f9bb46d769f0848c7d9de3c2810f55686fafa4c0d8ce29
SHA5125bdf83f604ea25d8e243abe631817dfac1d00552d329800c92f6e297cfea62e1f01108b235bf3bf55a6ca39fbad0e4b408a4b6ce3c141d84636df25e9e4d6f3a
-
Filesize
140KB
MD5e90e498009a13ae957dcde4e01065e7d
SHA1dcb4cc9b7d1ed3becc625597422d60aaf068a759
SHA256ca91bbd477e2a516997c48dde3da1a5eae4cad86ca664fea54f0103739073c94
SHA5124d0868f653e6c57d4011430ab81688f4f039550a9a0b5b1ce5ab1a695cb1dca7d7cdfb1d7c3920c35bbd3a8b441c820f00ae4e71f749650545ddd6894d597766