Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
183s -
max time network
186s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/04/2024, 23:37
Static task
static1
Behavioral task
behavioral1
Sample
d94878b3191902f93f42cb084e6f588e09293f67f380e896ad5b0bab91807c32.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
d94878b3191902f93f42cb084e6f588e09293f67f380e896ad5b0bab91807c32.exe
Resource
win10v2004-20240226-en
General
-
Target
d94878b3191902f93f42cb084e6f588e09293f67f380e896ad5b0bab91807c32.exe
-
Size
156KB
-
MD5
8313610121a1a01d985f5b1f48caf78e
-
SHA1
42c0ce70698c18c08ee985a3464e505201ebb9f9
-
SHA256
d94878b3191902f93f42cb084e6f588e09293f67f380e896ad5b0bab91807c32
-
SHA512
992fc799b34eeaab73cc4e63c912612a9f1bdad4fd9ce8e037285ea8676e03ef49f2cda371c060f12ea79fe8db617c4cdae205a32933e78d92959467a17ca7ad
-
SSDEEP
3072:ZsTOWVcx8jeFvB0Z/I8xSFJKxr2CrILXNoiv:WQIcvqVuJyr2CMLX+S
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" pcvaot.exe Set value (int) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" d94878b3191902f93f42cb084e6f588e09293f67f380e896ad5b0bab91807c32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation d94878b3191902f93f42cb084e6f588e09293f67f380e896ad5b0bab91807c32.exe -
Executes dropped EXE 1 IoCs
pid Process 5060 pcvaot.exe -
Adds Run key to start application 2 TTPs 27 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pcvaot = "C:\\Users\\Admin\\pcvaot.exe /y" pcvaot.exe Set value (str) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pcvaot = "C:\\Users\\Admin\\pcvaot.exe /i" pcvaot.exe Set value (str) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pcvaot = "C:\\Users\\Admin\\pcvaot.exe /g" pcvaot.exe Set value (str) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pcvaot = "C:\\Users\\Admin\\pcvaot.exe /c" pcvaot.exe Set value (str) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pcvaot = "C:\\Users\\Admin\\pcvaot.exe /v" pcvaot.exe Set value (str) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pcvaot = "C:\\Users\\Admin\\pcvaot.exe /d" pcvaot.exe Set value (str) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pcvaot = "C:\\Users\\Admin\\pcvaot.exe /s" pcvaot.exe Set value (str) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pcvaot = "C:\\Users\\Admin\\pcvaot.exe /a" pcvaot.exe Set value (str) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pcvaot = "C:\\Users\\Admin\\pcvaot.exe /k" pcvaot.exe Set value (str) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pcvaot = "C:\\Users\\Admin\\pcvaot.exe /b" pcvaot.exe Set value (str) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pcvaot = "C:\\Users\\Admin\\pcvaot.exe /q" pcvaot.exe Set value (str) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pcvaot = "C:\\Users\\Admin\\pcvaot.exe /x" pcvaot.exe Set value (str) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pcvaot = "C:\\Users\\Admin\\pcvaot.exe /l" pcvaot.exe Set value (str) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pcvaot = "C:\\Users\\Admin\\pcvaot.exe /f" pcvaot.exe Set value (str) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pcvaot = "C:\\Users\\Admin\\pcvaot.exe /n" pcvaot.exe Set value (str) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pcvaot = "C:\\Users\\Admin\\pcvaot.exe /o" pcvaot.exe Set value (str) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pcvaot = "C:\\Users\\Admin\\pcvaot.exe /b" d94878b3191902f93f42cb084e6f588e09293f67f380e896ad5b0bab91807c32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pcvaot = "C:\\Users\\Admin\\pcvaot.exe /e" pcvaot.exe Set value (str) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pcvaot = "C:\\Users\\Admin\\pcvaot.exe /h" pcvaot.exe Set value (str) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pcvaot = "C:\\Users\\Admin\\pcvaot.exe /t" pcvaot.exe Set value (str) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pcvaot = "C:\\Users\\Admin\\pcvaot.exe /r" pcvaot.exe Set value (str) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pcvaot = "C:\\Users\\Admin\\pcvaot.exe /m" pcvaot.exe Set value (str) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pcvaot = "C:\\Users\\Admin\\pcvaot.exe /p" pcvaot.exe Set value (str) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pcvaot = "C:\\Users\\Admin\\pcvaot.exe /w" pcvaot.exe Set value (str) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pcvaot = "C:\\Users\\Admin\\pcvaot.exe /z" pcvaot.exe Set value (str) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pcvaot = "C:\\Users\\Admin\\pcvaot.exe /j" pcvaot.exe Set value (str) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pcvaot = "C:\\Users\\Admin\\pcvaot.exe /u" pcvaot.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2828 d94878b3191902f93f42cb084e6f588e09293f67f380e896ad5b0bab91807c32.exe 2828 d94878b3191902f93f42cb084e6f588e09293f67f380e896ad5b0bab91807c32.exe 5060 pcvaot.exe 5060 pcvaot.exe 5060 pcvaot.exe 5060 pcvaot.exe 5060 pcvaot.exe 5060 pcvaot.exe 5060 pcvaot.exe 5060 pcvaot.exe 5060 pcvaot.exe 5060 pcvaot.exe 5060 pcvaot.exe 5060 pcvaot.exe 5060 pcvaot.exe 5060 pcvaot.exe 5060 pcvaot.exe 5060 pcvaot.exe 5060 pcvaot.exe 5060 pcvaot.exe 5060 pcvaot.exe 5060 pcvaot.exe 5060 pcvaot.exe 5060 pcvaot.exe 5060 pcvaot.exe 5060 pcvaot.exe 5060 pcvaot.exe 5060 pcvaot.exe 5060 pcvaot.exe 5060 pcvaot.exe 5060 pcvaot.exe 5060 pcvaot.exe 5060 pcvaot.exe 5060 pcvaot.exe 5060 pcvaot.exe 5060 pcvaot.exe 5060 pcvaot.exe 5060 pcvaot.exe 5060 pcvaot.exe 5060 pcvaot.exe 5060 pcvaot.exe 5060 pcvaot.exe 5060 pcvaot.exe 5060 pcvaot.exe 5060 pcvaot.exe 5060 pcvaot.exe 5060 pcvaot.exe 5060 pcvaot.exe 5060 pcvaot.exe 5060 pcvaot.exe 5060 pcvaot.exe 5060 pcvaot.exe 5060 pcvaot.exe 5060 pcvaot.exe 5060 pcvaot.exe 5060 pcvaot.exe 5060 pcvaot.exe 5060 pcvaot.exe 5060 pcvaot.exe 5060 pcvaot.exe 5060 pcvaot.exe 5060 pcvaot.exe 5060 pcvaot.exe 5060 pcvaot.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2828 d94878b3191902f93f42cb084e6f588e09293f67f380e896ad5b0bab91807c32.exe 5060 pcvaot.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2828 wrote to memory of 5060 2828 d94878b3191902f93f42cb084e6f588e09293f67f380e896ad5b0bab91807c32.exe 98 PID 2828 wrote to memory of 5060 2828 d94878b3191902f93f42cb084e6f588e09293f67f380e896ad5b0bab91807c32.exe 98 PID 2828 wrote to memory of 5060 2828 d94878b3191902f93f42cb084e6f588e09293f67f380e896ad5b0bab91807c32.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\d94878b3191902f93f42cb084e6f588e09293f67f380e896ad5b0bab91807c32.exe"C:\Users\Admin\AppData\Local\Temp\d94878b3191902f93f42cb084e6f588e09293f67f380e896ad5b0bab91807c32.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Users\Admin\pcvaot.exe"C:\Users\Admin\pcvaot.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4056 --field-trial-handle=2272,i,11831746627654527593,10138103687018060346,262144 --variations-seed-version /prefetch:81⤵PID:5112
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
156KB
MD592a5c357b2868e015e18a45c8d525468
SHA1c2a545db6767fe44b17f87b896b6392bdf2922ce
SHA2566d64e22834af48ce2d0546ece85a92438f412dfedea87e0c186b0f952a072714
SHA512b3a853fed7cf5e2d9b558d440b53ebee85da21002fd1e3e67b8b5e3826b3852a716da3abb0ff11d7ec6be98376817425238123e03fa14c693ec896db0a63f665