Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
160s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/04/2024, 19:18
Static task
static1
Behavioral task
behavioral1
Sample
27c3da81b80c10c5041f1083d568b778.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
27c3da81b80c10c5041f1083d568b778.exe
Resource
win10v2004-20240226-en
General
-
Target
27c3da81b80c10c5041f1083d568b778.exe
-
Size
48KB
-
MD5
27c3da81b80c10c5041f1083d568b778
-
SHA1
c2332153a421351275f6ba9cd3476d40d38f81b2
-
SHA256
d28e6dec073a1f9a47a3700225008096f8185095f94be2e1cd3a6b14615d590f
-
SHA512
eccc70dba76834b608b76898622fd8c9b42f2990b53d109f12987170c9ab6af79716d7798099ea196a10132cd8ecfa5d087b84928b514192e74f4c32baf2f2d5
-
SSDEEP
768:QbuipFA13weNFSmOEgYJ0+wIs+cN+Tnc/9/8IZnS0R0TYWfHenHLqHCTHgpQO0M:ctA1geNFSvEA+wMcN+Tnsx5S0REQO0M
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ktper.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 27c3da81b80c10c5041f1083d568b778.exe -
Executes dropped EXE 1 IoCs
pid Process 4996 ktper.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ktper = "C:\\Users\\Admin\\ktper.exe" ktper.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4996 ktper.exe 4996 ktper.exe 4996 ktper.exe 4996 ktper.exe 4996 ktper.exe 4996 ktper.exe 4996 ktper.exe 4996 ktper.exe 4996 ktper.exe 4996 ktper.exe 4996 ktper.exe 4996 ktper.exe 4996 ktper.exe 4996 ktper.exe 4996 ktper.exe 4996 ktper.exe 4996 ktper.exe 4996 ktper.exe 4996 ktper.exe 4996 ktper.exe 4996 ktper.exe 4996 ktper.exe 4996 ktper.exe 4996 ktper.exe 4996 ktper.exe 4996 ktper.exe 4996 ktper.exe 4996 ktper.exe 4996 ktper.exe 4996 ktper.exe 4996 ktper.exe 4996 ktper.exe 4996 ktper.exe 4996 ktper.exe 4996 ktper.exe 4996 ktper.exe 4996 ktper.exe 4996 ktper.exe 4996 ktper.exe 4996 ktper.exe 4996 ktper.exe 4996 ktper.exe 4996 ktper.exe 4996 ktper.exe 4996 ktper.exe 4996 ktper.exe 4996 ktper.exe 4996 ktper.exe 4996 ktper.exe 4996 ktper.exe 4996 ktper.exe 4996 ktper.exe 4996 ktper.exe 4996 ktper.exe 4996 ktper.exe 4996 ktper.exe 4996 ktper.exe 4996 ktper.exe 4996 ktper.exe 4996 ktper.exe 4996 ktper.exe 4996 ktper.exe 4996 ktper.exe 4996 ktper.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4824 27c3da81b80c10c5041f1083d568b778.exe 4996 ktper.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4824 wrote to memory of 4996 4824 27c3da81b80c10c5041f1083d568b778.exe 95 PID 4824 wrote to memory of 4996 4824 27c3da81b80c10c5041f1083d568b778.exe 95 PID 4824 wrote to memory of 4996 4824 27c3da81b80c10c5041f1083d568b778.exe 95 PID 4996 wrote to memory of 4824 4996 ktper.exe 90 PID 4996 wrote to memory of 4824 4996 ktper.exe 90 PID 4996 wrote to memory of 4824 4996 ktper.exe 90 PID 4996 wrote to memory of 4824 4996 ktper.exe 90 PID 4996 wrote to memory of 4824 4996 ktper.exe 90 PID 4996 wrote to memory of 4824 4996 ktper.exe 90 PID 4996 wrote to memory of 4824 4996 ktper.exe 90 PID 4996 wrote to memory of 4824 4996 ktper.exe 90 PID 4996 wrote to memory of 4824 4996 ktper.exe 90 PID 4996 wrote to memory of 4824 4996 ktper.exe 90 PID 4996 wrote to memory of 4824 4996 ktper.exe 90 PID 4996 wrote to memory of 4824 4996 ktper.exe 90 PID 4996 wrote to memory of 4824 4996 ktper.exe 90 PID 4996 wrote to memory of 4824 4996 ktper.exe 90 PID 4996 wrote to memory of 4824 4996 ktper.exe 90 PID 4996 wrote to memory of 4824 4996 ktper.exe 90 PID 4996 wrote to memory of 4824 4996 ktper.exe 90 PID 4996 wrote to memory of 4824 4996 ktper.exe 90 PID 4996 wrote to memory of 4824 4996 ktper.exe 90 PID 4996 wrote to memory of 4824 4996 ktper.exe 90 PID 4996 wrote to memory of 4824 4996 ktper.exe 90 PID 4996 wrote to memory of 4824 4996 ktper.exe 90 PID 4996 wrote to memory of 4824 4996 ktper.exe 90 PID 4996 wrote to memory of 4824 4996 ktper.exe 90 PID 4996 wrote to memory of 4824 4996 ktper.exe 90 PID 4996 wrote to memory of 4824 4996 ktper.exe 90 PID 4996 wrote to memory of 4824 4996 ktper.exe 90 PID 4996 wrote to memory of 4824 4996 ktper.exe 90 PID 4996 wrote to memory of 4824 4996 ktper.exe 90 PID 4996 wrote to memory of 4824 4996 ktper.exe 90 PID 4996 wrote to memory of 4824 4996 ktper.exe 90 PID 4996 wrote to memory of 4824 4996 ktper.exe 90 PID 4996 wrote to memory of 4824 4996 ktper.exe 90 PID 4996 wrote to memory of 4824 4996 ktper.exe 90 PID 4996 wrote to memory of 4824 4996 ktper.exe 90 PID 4996 wrote to memory of 4824 4996 ktper.exe 90 PID 4996 wrote to memory of 4824 4996 ktper.exe 90 PID 4996 wrote to memory of 4824 4996 ktper.exe 90 PID 4996 wrote to memory of 4824 4996 ktper.exe 90 PID 4996 wrote to memory of 4824 4996 ktper.exe 90 PID 4996 wrote to memory of 4824 4996 ktper.exe 90 PID 4996 wrote to memory of 4824 4996 ktper.exe 90 PID 4996 wrote to memory of 4824 4996 ktper.exe 90 PID 4996 wrote to memory of 4824 4996 ktper.exe 90 PID 4996 wrote to memory of 4824 4996 ktper.exe 90 PID 4996 wrote to memory of 4824 4996 ktper.exe 90 PID 4996 wrote to memory of 4824 4996 ktper.exe 90 PID 4996 wrote to memory of 4824 4996 ktper.exe 90 PID 4996 wrote to memory of 4824 4996 ktper.exe 90 PID 4996 wrote to memory of 4824 4996 ktper.exe 90 PID 4996 wrote to memory of 4824 4996 ktper.exe 90 PID 4996 wrote to memory of 4824 4996 ktper.exe 90 PID 4996 wrote to memory of 4824 4996 ktper.exe 90 PID 4996 wrote to memory of 4824 4996 ktper.exe 90 PID 4996 wrote to memory of 4824 4996 ktper.exe 90 PID 4996 wrote to memory of 4824 4996 ktper.exe 90 PID 4996 wrote to memory of 4824 4996 ktper.exe 90 PID 4996 wrote to memory of 4824 4996 ktper.exe 90 PID 4996 wrote to memory of 4824 4996 ktper.exe 90 PID 4996 wrote to memory of 4824 4996 ktper.exe 90 PID 4996 wrote to memory of 4824 4996 ktper.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\27c3da81b80c10c5041f1083d568b778.exe"C:\Users\Admin\AppData\Local\Temp\27c3da81b80c10c5041f1083d568b778.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Users\Admin\ktper.exe"C:\Users\Admin\ktper.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3872 --field-trial-handle=2284,i,9807419199535700662,2319175108930815708,262144 --variations-seed-version /prefetch:81⤵PID:484
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48KB
MD5987d775f23b8c6f6434cd8fb7cb05d68
SHA159127ae8443426b8d70dbbb637c7891118793b94
SHA2565c0f9c19b9fcb9cf749f8167ded5e3d11ca009ea3b422ec5de5fc2b8db92277a
SHA5120634cbc9bc2c83a39edebdf47b7841966a1ec866d3bd5574db25706822a5ee012281971247de6623e00a2beb128821867e314dcc24d09b1200917854630d57fa