Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    183s
  • max time network
    186s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/04/2024, 23:37

General

  • Target

    d94878b3191902f93f42cb084e6f588e09293f67f380e896ad5b0bab91807c32.exe

  • Size

    156KB

  • MD5

    8313610121a1a01d985f5b1f48caf78e

  • SHA1

    42c0ce70698c18c08ee985a3464e505201ebb9f9

  • SHA256

    d94878b3191902f93f42cb084e6f588e09293f67f380e896ad5b0bab91807c32

  • SHA512

    992fc799b34eeaab73cc4e63c912612a9f1bdad4fd9ce8e037285ea8676e03ef49f2cda371c060f12ea79fe8db617c4cdae205a32933e78d92959467a17ca7ad

  • SSDEEP

    3072:ZsTOWVcx8jeFvB0Z/I8xSFJKxr2CrILXNoiv:WQIcvqVuJyr2CMLX+S

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 27 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d94878b3191902f93f42cb084e6f588e09293f67f380e896ad5b0bab91807c32.exe
    "C:\Users\Admin\AppData\Local\Temp\d94878b3191902f93f42cb084e6f588e09293f67f380e896ad5b0bab91807c32.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2828
    • C:\Users\Admin\pcvaot.exe
      "C:\Users\Admin\pcvaot.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:5060
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4056 --field-trial-handle=2272,i,11831746627654527593,10138103687018060346,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:5112

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\pcvaot.exe

      Filesize

      156KB

      MD5

      92a5c357b2868e015e18a45c8d525468

      SHA1

      c2a545db6767fe44b17f87b896b6392bdf2922ce

      SHA256

      6d64e22834af48ce2d0546ece85a92438f412dfedea87e0c186b0f952a072714

      SHA512

      b3a853fed7cf5e2d9b558d440b53ebee85da21002fd1e3e67b8b5e3826b3852a716da3abb0ff11d7ec6be98376817425238123e03fa14c693ec896db0a63f665