Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/03/2024, 04:11

General

  • Target

    ca99d487a7ff3f5dbadb7abf5513f82d.exe

  • Size

    462KB

  • MD5

    ca99d487a7ff3f5dbadb7abf5513f82d

  • SHA1

    f81f5b4520abe15f6878b656ae7adbcd08852217

  • SHA256

    6a9029349a53fc4f664ec86fe75ab618e7a76524f7dc2037d9ea0719bba311f8

  • SHA512

    fcef575d069015c6646c8b0f47e41eb2bd61ce303d1839096d6a04a9cac653fab56058d8c88d84d40758f06b653ed67e32887c0a25d6e78837750c72fa41e00e

  • SSDEEP

    12288:loJe5X8bz7ZU9qqzVcztzAb1onikQsJuj:loJw8bzK9T31onmsJu

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ca99d487a7ff3f5dbadb7abf5513f82d.exe
    "C:\Users\Admin\AppData\Local\Temp\ca99d487a7ff3f5dbadb7abf5513f82d.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2012
    • C:\Users\Admin\AppData\Local\Temp\7EB5.tmp
      "C:\Users\Admin\AppData\Local\Temp\7EB5.tmp" --helpC:\Users\Admin\AppData\Local\Temp\ca99d487a7ff3f5dbadb7abf5513f82d.exe 983D82552FC5DE2FBDBCB8165226227F4FBBEADE07471EFDBBDAB308F2EE556F4E908EFB7F306CFE3BC78BB32C9A10F91927D2CB5BDE87CACC2AB7DF98A5795B
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Modifies registry class
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:3752
      • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
        "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\ca99d487a7ff3f5dbadb7abf5513f82d.docx" /o ""
        3⤵
        • Checks processor information in registry
        • Enumerates system info in registry
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of SetWindowsHookEx
        PID:3124

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7EB5.tmp

    Filesize

    462KB

    MD5

    97dffeb85704953fcd5c8fe060ff3a74

    SHA1

    f802c11b0ee74efe7b9c89b5029d748aceda94f8

    SHA256

    3cb83c39fffcff5a10f9bb46d769f0848c7d9de3c2810f55686fafa4c0d8ce29

    SHA512

    5bdf83f604ea25d8e243abe631817dfac1d00552d329800c92f6e297cfea62e1f01108b235bf3bf55a6ca39fbad0e4b408a4b6ce3c141d84636df25e9e4d6f3a

  • C:\Users\Admin\AppData\Local\Temp\ca99d487a7ff3f5dbadb7abf5513f82d.docx

    Filesize

    140KB

    MD5

    e90e498009a13ae957dcde4e01065e7d

    SHA1

    dcb4cc9b7d1ed3becc625597422d60aaf068a759

    SHA256

    ca91bbd477e2a516997c48dde3da1a5eae4cad86ca664fea54f0103739073c94

    SHA512

    4d0868f653e6c57d4011430ab81688f4f039550a9a0b5b1ce5ab1a695cb1dca7d7cdfb1d7c3920c35bbd3a8b441c820f00ae4e71f749650545ddd6894d597766

  • memory/3124-9-0x00007FFF1AD10000-0x00007FFF1AD20000-memory.dmp

    Filesize

    64KB

  • memory/3124-10-0x00007FFF1AD10000-0x00007FFF1AD20000-memory.dmp

    Filesize

    64KB

  • memory/3124-11-0x00007FFF1AD10000-0x00007FFF1AD20000-memory.dmp

    Filesize

    64KB

  • memory/3124-12-0x00007FFF1AD10000-0x00007FFF1AD20000-memory.dmp

    Filesize

    64KB

  • memory/3124-14-0x00007FFF5AC90000-0x00007FFF5AE85000-memory.dmp

    Filesize

    2.0MB

  • memory/3124-15-0x00007FFF5AC90000-0x00007FFF5AE85000-memory.dmp

    Filesize

    2.0MB

  • memory/3124-13-0x00007FFF1AD10000-0x00007FFF1AD20000-memory.dmp

    Filesize

    64KB

  • memory/3124-16-0x00007FFF5AC90000-0x00007FFF5AE85000-memory.dmp

    Filesize

    2.0MB

  • memory/3124-17-0x00007FFF5AC90000-0x00007FFF5AE85000-memory.dmp

    Filesize

    2.0MB

  • memory/3124-18-0x00007FFF5AC90000-0x00007FFF5AE85000-memory.dmp

    Filesize

    2.0MB

  • memory/3124-19-0x00007FFF5AC90000-0x00007FFF5AE85000-memory.dmp

    Filesize

    2.0MB

  • memory/3124-21-0x00007FFF5AC90000-0x00007FFF5AE85000-memory.dmp

    Filesize

    2.0MB

  • memory/3124-20-0x00007FFF18910000-0x00007FFF18920000-memory.dmp

    Filesize

    64KB

  • memory/3124-22-0x00007FFF5AC90000-0x00007FFF5AE85000-memory.dmp

    Filesize

    2.0MB

  • memory/3124-23-0x00007FFF5AC90000-0x00007FFF5AE85000-memory.dmp

    Filesize

    2.0MB

  • memory/3124-24-0x00007FFF5AC90000-0x00007FFF5AE85000-memory.dmp

    Filesize

    2.0MB

  • memory/3124-25-0x00007FFF5AC90000-0x00007FFF5AE85000-memory.dmp

    Filesize

    2.0MB

  • memory/3124-26-0x00007FFF18910000-0x00007FFF18920000-memory.dmp

    Filesize

    64KB

  • memory/3124-27-0x00007FFF5AC90000-0x00007FFF5AE85000-memory.dmp

    Filesize

    2.0MB

  • memory/3124-28-0x00007FFF5AC90000-0x00007FFF5AE85000-memory.dmp

    Filesize

    2.0MB

  • memory/3124-30-0x00007FFF5AC90000-0x00007FFF5AE85000-memory.dmp

    Filesize

    2.0MB

  • memory/3124-29-0x00007FFF5AC90000-0x00007FFF5AE85000-memory.dmp

    Filesize

    2.0MB

  • memory/3124-31-0x00007FFF5AC90000-0x00007FFF5AE85000-memory.dmp

    Filesize

    2.0MB

  • memory/3124-44-0x00007FFF5AC90000-0x00007FFF5AE85000-memory.dmp

    Filesize

    2.0MB