Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05/04/2024, 14:03
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240221-en
General
-
Target
file.exe
-
Size
2.5MB
-
MD5
6ee8535bb232fe000b49153b670a1803
-
SHA1
f614e5e362ea0f85f8938e337591c210831db32f
-
SHA256
c41c07c2d1e2fd62641eba007673cfcd56bdc30a4e608e43656805db673b151f
-
SHA512
859a1e0a60075e13e9c84ab976758f78f1019aa5d8bda7137bd5efc92bf677e7c01d285087724d11f04bccbf707d490719abb52c22fa97c688a108b971ea54fd
-
SSDEEP
49152:YImcWL9IPguCKmUIZ79ecM8Cmh2HL7dGfCybeiFkq4nF3SbYN2Y:YH9fF79bMbQExGf5eiFL4nF3Sbi
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation file.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation work.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation grdfe.exe -
Executes dropped EXE 3 IoCs
pid Process 3484 work.exe 1556 grdfe.exe 4112 dllhost.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/files/0x0008000000023207-14.dat vmprotect behavioral2/memory/1556-22-0x0000000000420000-0x0000000000798000-memory.dmp vmprotect -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\dotnet\swidtag\csrss.exe grdfe.exe File created C:\Program Files\dotnet\swidtag\886983d96e3d3e grdfe.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\IdentityCRL\smss.exe grdfe.exe File created C:\Windows\IdentityCRL\69ddcba757bf72 grdfe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\Local Settings grdfe.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 920 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1556 grdfe.exe 1556 grdfe.exe 1556 grdfe.exe 1556 grdfe.exe 1556 grdfe.exe 1556 grdfe.exe 1556 grdfe.exe 1556 grdfe.exe 1556 grdfe.exe 1556 grdfe.exe 1556 grdfe.exe 1556 grdfe.exe 1556 grdfe.exe 1556 grdfe.exe 1556 grdfe.exe 1556 grdfe.exe 1556 grdfe.exe 1556 grdfe.exe 1556 grdfe.exe 1556 grdfe.exe 1556 grdfe.exe 1556 grdfe.exe 1556 grdfe.exe 1556 grdfe.exe 1556 grdfe.exe 1556 grdfe.exe 1556 grdfe.exe 1556 grdfe.exe 1556 grdfe.exe 1556 grdfe.exe 1556 grdfe.exe 1556 grdfe.exe 1556 grdfe.exe 1556 grdfe.exe 1556 grdfe.exe 1556 grdfe.exe 1556 grdfe.exe 1556 grdfe.exe 1556 grdfe.exe 1556 grdfe.exe 1556 grdfe.exe 1556 grdfe.exe 1556 grdfe.exe 1556 grdfe.exe 1556 grdfe.exe 1556 grdfe.exe 1556 grdfe.exe 1556 grdfe.exe 1556 grdfe.exe 1556 grdfe.exe 1556 grdfe.exe 1556 grdfe.exe 1556 grdfe.exe 1556 grdfe.exe 1556 grdfe.exe 1556 grdfe.exe 1556 grdfe.exe 1556 grdfe.exe 1556 grdfe.exe 1556 grdfe.exe 1556 grdfe.exe 1556 grdfe.exe 1556 grdfe.exe 1556 grdfe.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4112 dllhost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1556 grdfe.exe Token: SeDebugPrivilege 4112 dllhost.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2572 wrote to memory of 1472 2572 file.exe 88 PID 2572 wrote to memory of 1472 2572 file.exe 88 PID 2572 wrote to memory of 1472 2572 file.exe 88 PID 1472 wrote to memory of 3484 1472 cmd.exe 91 PID 1472 wrote to memory of 3484 1472 cmd.exe 91 PID 1472 wrote to memory of 3484 1472 cmd.exe 91 PID 3484 wrote to memory of 1556 3484 work.exe 92 PID 3484 wrote to memory of 1556 3484 work.exe 92 PID 1556 wrote to memory of 4244 1556 grdfe.exe 95 PID 1556 wrote to memory of 4244 1556 grdfe.exe 95 PID 4244 wrote to memory of 5112 4244 cmd.exe 97 PID 4244 wrote to memory of 5112 4244 cmd.exe 97 PID 4244 wrote to memory of 920 4244 cmd.exe 98 PID 4244 wrote to memory of 920 4244 cmd.exe 98 PID 4244 wrote to memory of 4112 4244 cmd.exe 104 PID 4244 wrote to memory of 4112 4244 cmd.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\1.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\work.exework.exe -priverdD3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\grdfe.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\grdfe.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\TBGbYYvk1i.bat"5⤵
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Windows\system32\chcp.comchcp 650016⤵PID:5112
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost6⤵
- Runs ping.exe
PID:920
-
-
C:\odt\dllhost.exe"C:\odt\dllhost.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:4112
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35B
MD5ff59d999beb970447667695ce3273f75
SHA1316fa09f467ba90ac34a054daf2e92e6e2854ff8
SHA256065d2b17ad499587dc9de7ee9ecda4938b45da1df388bc72e6627dff220f64d2
SHA512d5ac72cb065a3cd3cb118a69a2f356314eeed24dcb4880751e1a3683895e66cedc62607967e29f77a0c27adf1c9fe0efd86e804f693f0a63a5b51b0bf0056b5d
-
Filesize
2.4MB
MD53ed540faf4896c7f82a2643dfd501525
SHA12ca1ac39738968ead234b489cc69f859d4e67a7f
SHA256c2958372620455f32fe5836d1aa4d37feeec6009e17ed1df5d14944645eb8a81
SHA51282d8b95f057740cb35f65deecd5d2367814041119b0cb5afc800aa4fa8500f2953ba94d390915b6241d959575e131d6e638b3dae66963de9f8e60e2f9a6dad97
-
Filesize
2.1MB
MD599e521a2816ca108f31a4a26e971dd67
SHA1194e9801a30e3bee67d49b160115373022c9ff32
SHA25665c33f919aa4b3be2f4b7316f66ffeac9441e735b6e846b84b8e331951c8c5c7
SHA5124ff9abbecac209b00a9e613daabf3e9df7b0d0db28ce62f3ecc011919617f8ef542f9d95d905ebc62b9b081bc1ab1192410ea9e273cf1bcdac59f78390dbcbb6
-
Filesize
146B
MD599d37fa42f9f1f4059aeec6957596a47
SHA1a04e8b6b1068abe923789d6346e105c1487996ae
SHA256026317bc96111b3a12e10eb8ac4e4056edb5cf7a27fb757737ea26a0426125a7
SHA51267add9334a5a0ca7c13693e1c19bcba55f99cf51b9caa2e8726eaae94f47dc1691c371add3a10a94fc4ed50aa1141c5db86f60362ea036d064585b3472b14202