Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
15/04/2024, 07:11
Static task
static1
Behavioral task
behavioral1
Sample
1d854192e5aac93a950c60e013a8f08283ad81f841dd90da9326198f37c8adda.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
1d854192e5aac93a950c60e013a8f08283ad81f841dd90da9326198f37c8adda.exe
Resource
win10v2004-20240412-en
General
-
Target
1d854192e5aac93a950c60e013a8f08283ad81f841dd90da9326198f37c8adda.exe
-
Size
767KB
-
MD5
ae2f422a1ca6558ca6dd723c1b351b7a
-
SHA1
eeec0b0012f1b6c41a70f6f13d2ec01e0b3ef6ad
-
SHA256
1d854192e5aac93a950c60e013a8f08283ad81f841dd90da9326198f37c8adda
-
SHA512
30a0ea93646669e6b2aac357e36c558da8fbd166435cc05d33daf80e01d12c4dfa903e6532ff0e58c47faee12c63998aa2313bb2e73650878f3d050654c751c3
-
SSDEEP
12288:WMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9Ks:WnsJ39LyjbJkQFMhmC+6GD9R
Malware Config
Extracted
C:\Users\Admin\Desktop\Readme.txt
Signatures
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 1664 bcdedit.exe 3032 bcdedit.exe -
Renames multiple (318) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
pid Process 2180 wbadmin.exe -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\International\Geo\Nation ._cache_1d854192e5aac93a950c60e013a8f08283ad81f841dd90da9326198f37c8adda.exe Key value queried \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\International\Geo\Nation Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\International\Geo\Nation ._cache_Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\International\Geo\Nation Runtime Broker.exe Key value queried \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\International\Geo\Nation 1d854192e5aac93a950c60e013a8f08283ad81f841dd90da9326198f37c8adda.exe -
Executes dropped EXE 5 IoCs
pid Process 1600 ._cache_1d854192e5aac93a950c60e013a8f08283ad81f841dd90da9326198f37c8adda.exe 3048 Synaptics.exe 1980 Runtime Broker.exe 4976 ._cache_Synaptics.exe 4612 Runtime Broker.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\????? = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 1d854192e5aac93a950c60e013a8f08283ad81f841dd90da9326198f37c8adda.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Readme = "C:\\Users\\Admin\\AppData\\Local\\Runtime Broker.exe" Runtime Broker.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\McSIbsZH9.jpg" Runtime Broker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 4 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName vds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName vds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 vds.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 4108 vssadmin.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 1d854192e5aac93a950c60e013a8f08283ad81f841dd90da9326198f37c8adda.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Suspicious behavior: EnumeratesProcesses 50 IoCs
pid Process 4612 Runtime Broker.exe 4612 Runtime Broker.exe 4612 Runtime Broker.exe 4612 Runtime Broker.exe 4612 Runtime Broker.exe 4612 Runtime Broker.exe 4612 Runtime Broker.exe 4612 Runtime Broker.exe 4612 Runtime Broker.exe 4612 Runtime Broker.exe 4612 Runtime Broker.exe 4612 Runtime Broker.exe 4612 Runtime Broker.exe 4612 Runtime Broker.exe 4612 Runtime Broker.exe 4612 Runtime Broker.exe 4612 Runtime Broker.exe 4612 Runtime Broker.exe 4612 Runtime Broker.exe 4612 Runtime Broker.exe 4612 Runtime Broker.exe 4612 Runtime Broker.exe 4612 Runtime Broker.exe 4612 Runtime Broker.exe 4612 Runtime Broker.exe 4612 Runtime Broker.exe 4612 Runtime Broker.exe 4612 Runtime Broker.exe 4612 Runtime Broker.exe 4612 Runtime Broker.exe 4612 Runtime Broker.exe 4612 Runtime Broker.exe 4612 Runtime Broker.exe 4612 Runtime Broker.exe 4612 Runtime Broker.exe 4612 Runtime Broker.exe 4612 Runtime Broker.exe 4612 Runtime Broker.exe 4612 Runtime Broker.exe 4612 Runtime Broker.exe 4612 Runtime Broker.exe 4612 Runtime Broker.exe 4612 Runtime Broker.exe 4612 Runtime Broker.exe 4612 Runtime Broker.exe 4612 Runtime Broker.exe 4612 Runtime Broker.exe 4612 Runtime Broker.exe 4612 Runtime Broker.exe 4612 Runtime Broker.exe -
Suspicious use of AdjustPrivilegeToken 51 IoCs
description pid Process Token: SeDebugPrivilege 1600 ._cache_1d854192e5aac93a950c60e013a8f08283ad81f841dd90da9326198f37c8adda.exe Token: SeDebugPrivilege 4976 ._cache_Synaptics.exe Token: SeDebugPrivilege 4612 Runtime Broker.exe Token: SeBackupPrivilege 1276 vssvc.exe Token: SeRestorePrivilege 1276 vssvc.exe Token: SeAuditPrivilege 1276 vssvc.exe Token: SeIncreaseQuotaPrivilege 4348 WMIC.exe Token: SeSecurityPrivilege 4348 WMIC.exe Token: SeTakeOwnershipPrivilege 4348 WMIC.exe Token: SeLoadDriverPrivilege 4348 WMIC.exe Token: SeSystemProfilePrivilege 4348 WMIC.exe Token: SeSystemtimePrivilege 4348 WMIC.exe Token: SeProfSingleProcessPrivilege 4348 WMIC.exe Token: SeIncBasePriorityPrivilege 4348 WMIC.exe Token: SeCreatePagefilePrivilege 4348 WMIC.exe Token: SeBackupPrivilege 4348 WMIC.exe Token: SeRestorePrivilege 4348 WMIC.exe Token: SeShutdownPrivilege 4348 WMIC.exe Token: SeDebugPrivilege 4348 WMIC.exe Token: SeSystemEnvironmentPrivilege 4348 WMIC.exe Token: SeRemoteShutdownPrivilege 4348 WMIC.exe Token: SeUndockPrivilege 4348 WMIC.exe Token: SeManageVolumePrivilege 4348 WMIC.exe Token: 33 4348 WMIC.exe Token: 34 4348 WMIC.exe Token: 35 4348 WMIC.exe Token: 36 4348 WMIC.exe Token: SeIncreaseQuotaPrivilege 4348 WMIC.exe Token: SeSecurityPrivilege 4348 WMIC.exe Token: SeTakeOwnershipPrivilege 4348 WMIC.exe Token: SeLoadDriverPrivilege 4348 WMIC.exe Token: SeSystemProfilePrivilege 4348 WMIC.exe Token: SeSystemtimePrivilege 4348 WMIC.exe Token: SeProfSingleProcessPrivilege 4348 WMIC.exe Token: SeIncBasePriorityPrivilege 4348 WMIC.exe Token: SeCreatePagefilePrivilege 4348 WMIC.exe Token: SeBackupPrivilege 4348 WMIC.exe Token: SeRestorePrivilege 4348 WMIC.exe Token: SeShutdownPrivilege 4348 WMIC.exe Token: SeDebugPrivilege 4348 WMIC.exe Token: SeSystemEnvironmentPrivilege 4348 WMIC.exe Token: SeRemoteShutdownPrivilege 4348 WMIC.exe Token: SeUndockPrivilege 4348 WMIC.exe Token: SeManageVolumePrivilege 4348 WMIC.exe Token: 33 4348 WMIC.exe Token: 34 4348 WMIC.exe Token: 35 4348 WMIC.exe Token: 36 4348 WMIC.exe Token: SeBackupPrivilege 2728 wbengine.exe Token: SeRestorePrivilege 2728 wbengine.exe Token: SeSecurityPrivilege 2728 wbengine.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 528 wrote to memory of 1600 528 1d854192e5aac93a950c60e013a8f08283ad81f841dd90da9326198f37c8adda.exe 87 PID 528 wrote to memory of 1600 528 1d854192e5aac93a950c60e013a8f08283ad81f841dd90da9326198f37c8adda.exe 87 PID 528 wrote to memory of 3048 528 1d854192e5aac93a950c60e013a8f08283ad81f841dd90da9326198f37c8adda.exe 88 PID 528 wrote to memory of 3048 528 1d854192e5aac93a950c60e013a8f08283ad81f841dd90da9326198f37c8adda.exe 88 PID 528 wrote to memory of 3048 528 1d854192e5aac93a950c60e013a8f08283ad81f841dd90da9326198f37c8adda.exe 88 PID 1600 wrote to memory of 1980 1600 ._cache_1d854192e5aac93a950c60e013a8f08283ad81f841dd90da9326198f37c8adda.exe 89 PID 1600 wrote to memory of 1980 1600 ._cache_1d854192e5aac93a950c60e013a8f08283ad81f841dd90da9326198f37c8adda.exe 89 PID 3048 wrote to memory of 4976 3048 Synaptics.exe 90 PID 3048 wrote to memory of 4976 3048 Synaptics.exe 90 PID 4976 wrote to memory of 4612 4976 ._cache_Synaptics.exe 91 PID 4976 wrote to memory of 4612 4976 ._cache_Synaptics.exe 91 PID 4612 wrote to memory of 3124 4612 Runtime Broker.exe 93 PID 4612 wrote to memory of 3124 4612 Runtime Broker.exe 93 PID 3124 wrote to memory of 4108 3124 cmd.exe 95 PID 3124 wrote to memory of 4108 3124 cmd.exe 95 PID 3124 wrote to memory of 4348 3124 cmd.exe 98 PID 3124 wrote to memory of 4348 3124 cmd.exe 98 PID 4612 wrote to memory of 4020 4612 Runtime Broker.exe 100 PID 4612 wrote to memory of 4020 4612 Runtime Broker.exe 100 PID 4020 wrote to memory of 1664 4020 cmd.exe 102 PID 4020 wrote to memory of 1664 4020 cmd.exe 102 PID 4020 wrote to memory of 3032 4020 cmd.exe 103 PID 4020 wrote to memory of 3032 4020 cmd.exe 103 PID 4612 wrote to memory of 1216 4612 Runtime Broker.exe 104 PID 4612 wrote to memory of 1216 4612 Runtime Broker.exe 104 PID 1216 wrote to memory of 2180 1216 cmd.exe 106 PID 1216 wrote to memory of 2180 1216 cmd.exe 106 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d854192e5aac93a950c60e013a8f08283ad81f841dd90da9326198f37c8adda.exe"C:\Users\Admin\AppData\Local\Temp\1d854192e5aac93a950c60e013a8f08283ad81f841dd90da9326198f37c8adda.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Users\Admin\AppData\Local\Temp\._cache_1d854192e5aac93a950c60e013a8f08283ad81f841dd90da9326198f37c8adda.exe"C:\Users\Admin\AppData\Local\Temp\._cache_1d854192e5aac93a950c60e013a8f08283ad81f841dd90da9326198f37c8adda.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Users\Admin\AppData\Local\Runtime Broker.exe"C:\Users\Admin\AppData\Local\Runtime Broker.exe"3⤵
- Executes dropped EXE
PID:1980
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Users\Admin\AppData\Local\Runtime Broker.exe"C:\Users\Admin\AppData\Local\Runtime Broker.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Sets desktop wallpaper using registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C vssadmin delete shadows /all /quiet & wmic shadowcopy delete5⤵
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet6⤵
- Interacts with shadow copies
PID:4108
-
-
C:\Windows\System32\Wbem\WMIC.exewmic shadowcopy delete6⤵
- Suspicious use of AdjustPrivilegeToken
PID:4348
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no5⤵
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy ignoreallfailures6⤵
- Modifies boot configuration data using bcdedit
PID:1664
-
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled no6⤵
- Modifies boot configuration data using bcdedit
PID:3032
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C wbadmin delete catalog -quiet5⤵
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Windows\system32\wbadmin.exewbadmin delete catalog -quiet6⤵
- Deletes backup catalog
PID:2180
-
-
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1276
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2728
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:4896
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Checks SCSI registry key(s)
PID:852
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
767KB
MD5ae2f422a1ca6558ca6dd723c1b351b7a
SHA1eeec0b0012f1b6c41a70f6f13d2ec01e0b3ef6ad
SHA2561d854192e5aac93a950c60e013a8f08283ad81f841dd90da9326198f37c8adda
SHA51230a0ea93646669e6b2aac357e36c558da8fbd166435cc05d33daf80e01d12c4dfa903e6532ff0e58c47faee12c63998aa2313bb2e73650878f3d050654c751c3
-
Filesize
42B
MD584cfdb4b995b1dbf543b26b86c863adc
SHA1d2f47764908bf30036cf8248b9ff5541e2711fa2
SHA256d8988d672d6915b46946b28c06ad8066c50041f6152a91d37ffa5cf129cc146b
SHA512485f0ed45e13f00a93762cbf15b4b8f996553baa021152fae5aba051e3736bcd3ca8f4328f0e6d9e3e1f910c96c4a9ae055331123ee08e3c2ce3a99ac2e177ce
-
C:\Users\Admin\AppData\Local\Temp\._cache_1d854192e5aac93a950c60e013a8f08283ad81f841dd90da9326198f37c8adda.exe
Filesize22KB
MD5c664f5be59fb3a17761dd2ada9eef228
SHA11f32c2b1aa103c73c9fb9624e53318d5bc8d60f1
SHA2562a567c61c401c4fd6f7a4ae88265d7a0dbd0c14fdcc116f8c5d98da6022066ec
SHA512c24a25237d009715f3b98fdf4489af8a484ab93091dbbd6ab1815946c9af24cff3f026bb3e7bff969348621cc82769b7fd1dde5bdbaba14768b229cac85b2259
-
Filesize
1KB
MD54e5afc973a7d062342a5020e33bf85dc
SHA1345fbfd0fcad94b2975021c802f5345cce10e037
SHA256ce82cff28fa692ed34a2e9076641f2097248412ac990fd1fe59fc1ae6cda7401
SHA512e41f9fb8ce570fdb5b6fe213f9774f639d156f43a10ba18c0c90f528956f8ca1677b9663930132242751bcf26174eaedeb909779c1f4e521b00468647904e5a5