Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    450s
  • max time network
    454s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/04/2024, 11:57

General

  • Target

    88_SETUP.exe

  • Size

    84KB

  • MD5

    78d7c0fd7f3c2899389b7c6eb070633e

  • SHA1

    d295cc9c0e6996eb3b3c718832b76bed7a0ac830

  • SHA256

    bb25d336575bf1ddea1c4d4dfd46c0d5763e864616b3382b2fe858722dc20376

  • SHA512

    a4d1f3eb023c32a6afd19a6ee536ce088d428cfd37b6d3de20a8a7c2910bd24850efd83e0e36d7663dff0d4fe5109c02cda7eb182ba603b8b2eaff460d4e4975

  • SSDEEP

    1536:3igyMZ/lsDX1fUTKyrTu3XPjNwKnSrRrMye+yi8h0G8fLQe49VDj:w13yO3XP1SGye+yiXGULQJ9VDj

Score
10/10

Malware Config

Signatures

  • Contains code to disable Windows Defender 1 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Disables Task Manager via registry modification
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 7 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 21 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 26 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\88_SETUP.exe
    "C:\Users\Admin\AppData\Local\Temp\88_SETUP.exe"
    1⤵
    • Checks computer location settings
    • Drops startup file
    • Sets desktop wallpaper using registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3108
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\88_SETUP.exe'
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1888
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '88_SETUP.exe'
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2932
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\$77thing123'
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2212
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '$77thing123'
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4360
    • C:\Windows\System32\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "$77thing123" /tr "C:\ProgramData\$77thing123"
      2⤵
      • Creates scheduled task(s)
      PID:3128
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\How To Decrypt My Files.html
      2⤵
        PID:5112
    • C:\Windows\system32\taskmgr.exe
      "C:\Windows\system32\taskmgr.exe" /4
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:5012
    • C:\ProgramData\$77thing123
      C:\ProgramData\$77thing123
      1⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1812
    • C:\Windows\system32\notepad.exe
      "C:\Windows\system32\notepad.exe"
      1⤵
        PID:1480
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3980 --field-trial-handle=2236,i,5367110156796017614,12594004256180761011,262144 --variations-seed-version /prefetch:8
        1⤵
          PID:4640
        • C:\ProgramData\$77thing123
          C:\ProgramData\$77thing123
          1⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:3160
        • C:\ProgramData\$77thing123
          C:\ProgramData\$77thing123
          1⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:1172
        • C:\ProgramData\$77thing123
          C:\ProgramData\$77thing123
          1⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:2540
        • C:\Windows\system32\taskmgr.exe
          "C:\Windows\system32\taskmgr.exe" /4
          1⤵
          • Checks SCSI registry key(s)
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of AdjustPrivilegeToken
          PID:2180
        • C:\ProgramData\$77thing123
          C:\ProgramData\$77thing123
          1⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:1516
        • C:\ProgramData\$77thing123
          C:\ProgramData\$77thing123
          1⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:1708
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --mojo-platform-channel-handle=5204 --field-trial-handle=2236,i,5367110156796017614,12594004256180761011,262144 --variations-seed-version /prefetch:1
          1⤵
            PID:1548
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=19 --mojo-platform-channel-handle=3492 --field-trial-handle=2236,i,5367110156796017614,12594004256180761011,262144 --variations-seed-version /prefetch:1
            1⤵
              PID:2692
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4724 --field-trial-handle=2236,i,5367110156796017614,12594004256180761011,262144 --variations-seed-version /prefetch:8
              1⤵
                PID:116
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=21 --mojo-platform-channel-handle=5496 --field-trial-handle=2236,i,5367110156796017614,12594004256180761011,262144 --variations-seed-version /prefetch:1
                1⤵
                  PID:2248
                • C:\Windows\system32\notepad.exe
                  "C:\Windows\system32\notepad.exe"
                  1⤵
                    PID:2620
                  • C:\ProgramData\$77thing123
                    C:\ProgramData\$77thing123
                    1⤵
                    • Executes dropped EXE
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4132
                  • C:\Windows\system32\OpenWith.exe
                    C:\Windows\system32\OpenWith.exe -Embedding
                    1⤵
                    • Modifies registry class
                    • Suspicious behavior: GetForegroundWindowSpam
                    • Suspicious use of SetWindowsHookEx
                    PID:4304
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --no-appcompat-clear --mojo-platform-channel-handle=5700 --field-trial-handle=2236,i,5367110156796017614,12594004256180761011,262144 --variations-seed-version /prefetch:8
                    1⤵
                      PID:632

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\ProgramData\$77thing123

                      Filesize

                      84KB

                      MD5

                      78d7c0fd7f3c2899389b7c6eb070633e

                      SHA1

                      d295cc9c0e6996eb3b3c718832b76bed7a0ac830

                      SHA256

                      bb25d336575bf1ddea1c4d4dfd46c0d5763e864616b3382b2fe858722dc20376

                      SHA512

                      a4d1f3eb023c32a6afd19a6ee536ce088d428cfd37b6d3de20a8a7c2910bd24850efd83e0e36d7663dff0d4fe5109c02cda7eb182ba603b8b2eaff460d4e4975

                    • C:\Users\Admin\AppData\Local\D3DSCache\e8010882af4f153f\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.idx

                      Filesize

                      64KB

                      MD5

                      d2fb266b97caff2086bf0fa74eddb6b2

                      SHA1

                      2f0061ce9c51b5b4fbab76b37fc6a540be7f805d

                      SHA256

                      b09f68b61d9ff5a7c7c8b10eee9447d4813ee0e866346e629e788cd4adecb66a

                      SHA512

                      c3ba95a538c1d266beb83334af755c34ce642a4178ab0f2e5f7822fd6821d3b68862a8b58f167a9294e6d913b08c1054a69b5d7aec2efdb3cf9796ed84de21a8

                    • C:\Users\Admin\AppData\Local\D3DSCache\e8010882af4f153f\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.lock

                      Filesize

                      4B

                      MD5

                      f49655f856acb8884cc0ace29216f511

                      SHA1

                      cb0f1f87ec0455ec349aaa950c600475ac7b7b6b

                      SHA256

                      7852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba

                      SHA512

                      599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8

                    • C:\Users\Admin\AppData\Local\D3DSCache\e8010882af4f153f\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.val

                      Filesize

                      944B

                      MD5

                      6bd369f7c74a28194c991ed1404da30f

                      SHA1

                      0f8e3f8ab822c9374409fe399b6bfe5d68cbd643

                      SHA256

                      878947d0ec814fe7c343cdebc05eebf00eb14f3023bdb3809a559e17f399fe5d

                      SHA512

                      8fc5f073dc9fa1e1ae47c60a5f06e0a48709fd6a4302dffaa721858409e7bde64bc6856d3fb28891090516d1a7afc542579de287778b5755eafe75cc67d45d93

                    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\$77thing123.log

                      Filesize

                      654B

                      MD5

                      2ff39f6c7249774be85fd60a8f9a245e

                      SHA1

                      684ff36b31aedc1e587c8496c02722c6698c1c4e

                      SHA256

                      e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced

                      SHA512

                      1d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1

                    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                      Filesize

                      2KB

                      MD5

                      d85ba6ff808d9e5444a4b369f5bc2730

                      SHA1

                      31aa9d96590fff6981b315e0b391b575e4c0804a

                      SHA256

                      84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                      SHA512

                      8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                      Filesize

                      944B

                      MD5

                      d28a889fd956d5cb3accfbaf1143eb6f

                      SHA1

                      157ba54b365341f8ff06707d996b3635da8446f7

                      SHA256

                      21e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45

                      SHA512

                      0b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c

                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                      Filesize

                      944B

                      MD5

                      ec66606831e595ea115f35d1b61b7105

                      SHA1

                      f22d025450dc8dafd9b434b2eb31cb876bcb8109

                      SHA256

                      4f17fe98ecf3ea9ec9873ff0a3acdd6ca93eb17e280a01ff6cfeca4422019dec

                      SHA512

                      f2922870f0b34b5cd8a75ce3aa94362a43997a752b0e8e9001f63d650225bf15415a75ce8aa333e4d3554a52ca5d40eec7b15ce67e3ee20441cf2680de59ed5d

                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                      Filesize

                      944B

                      MD5

                      96e3b86880fedd5afc001d108732a3e5

                      SHA1

                      8fc17b39d744a9590a6d5897012da5e6757439a3

                      SHA256

                      c3077e4cadb4ed246c02abe55aa6cf832fee4c2546b7addb7d22cd1c7c8c1294

                      SHA512

                      909b1968f7204fa7029109b02232d8cc5438f6b4dc7c9044e4e47c59fcee538199b13029e36592b12ed573d48a308dd4822d2ced4129ab08d4111897e02be55d

                    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_r3pwcrzu.o0l.ps1

                      Filesize

                      60B

                      MD5

                      d17fe0a3f47be24a6453e9ef58c94641

                      SHA1

                      6ab83620379fc69f80c0242105ddffd7d98d5d9d

                      SHA256

                      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                      SHA512

                      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\$77thing123.lnk

                      Filesize

                      668B

                      MD5

                      58da13e0cdc10a3c0fc51a7173d1c1ea

                      SHA1

                      a8f3e9cca73d0bc05453213666bd2eb19f5d9a12

                      SHA256

                      5d90041fc82f0d08170520f3bec1ec8558ed1e3fcb57b9e0dfc03f12b07ee7ca

                      SHA512

                      03b311c8d0f040f6a53d338a061bbb42aef7d6682e55c4b68f0ef0eeb73bb0e822882cd0e7b258ac18afa9fcdb599b60534b23c48a5ff9d15005ac19c115dca0

                    • C:\Users\Admin\NTUSER.DAT{53b39e88-18c4-11ea-a811-000d3aa4692b}.TMContainer00000000000000000001.regtrans-ms.ENC

                      Filesize

                      16B

                      MD5

                      d012e5555ae6936cbe76b0edf9b0da69

                      SHA1

                      0a80fe68cdd19432d8f4ccae4b505613064f1966

                      SHA256

                      7a35c4144ba71bf57b0fe01b116314ff31f3765cd6667c3d48def6fe1c4af861

                      SHA512

                      920b93ad09eddab8b03be79bc8813abce6beaa0cbb37ff0a8d85c92c8940ce003bb03d967eaa84d22b01e00aabfab26e16c2d41fb2c56bd60bf08171cb130de6

                    • memory/1888-17-0x00000231D2ED0000-0x00000231D2EE0000-memory.dmp

                      Filesize

                      64KB

                    • memory/1888-20-0x00007FFBEE9A0000-0x00007FFBEF461000-memory.dmp

                      Filesize

                      10.8MB

                    • memory/1888-11-0x00000231D2ED0000-0x00000231D2EE0000-memory.dmp

                      Filesize

                      64KB

                    • memory/1888-3-0x00007FFBEE9A0000-0x00007FFBEF461000-memory.dmp

                      Filesize

                      10.8MB

                    • memory/1888-9-0x00000231D2E20000-0x00000231D2E42000-memory.dmp

                      Filesize

                      136KB

                    • memory/1888-16-0x00000231D2ED0000-0x00000231D2EE0000-memory.dmp

                      Filesize

                      64KB

                    • memory/1888-10-0x00000231D2ED0000-0x00000231D2EE0000-memory.dmp

                      Filesize

                      64KB

                    • memory/2180-299-0x000001EAB6370000-0x000001EAB6371000-memory.dmp

                      Filesize

                      4KB

                    • memory/2180-297-0x000001EAB6370000-0x000001EAB6371000-memory.dmp

                      Filesize

                      4KB

                    • memory/2180-294-0x000001EAB6370000-0x000001EAB6371000-memory.dmp

                      Filesize

                      4KB

                    • memory/2180-295-0x000001EAB6370000-0x000001EAB6371000-memory.dmp

                      Filesize

                      4KB

                    • memory/2180-296-0x000001EAB6370000-0x000001EAB6371000-memory.dmp

                      Filesize

                      4KB

                    • memory/2180-298-0x000001EAB6370000-0x000001EAB6371000-memory.dmp

                      Filesize

                      4KB

                    • memory/2180-287-0x000001EAB6370000-0x000001EAB6371000-memory.dmp

                      Filesize

                      4KB

                    • memory/2180-288-0x000001EAB6370000-0x000001EAB6371000-memory.dmp

                      Filesize

                      4KB

                    • memory/2180-289-0x000001EAB6370000-0x000001EAB6371000-memory.dmp

                      Filesize

                      4KB

                    • memory/3108-74-0x00000000028E0000-0x00000000028F0000-memory.dmp

                      Filesize

                      64KB

                    • memory/3108-0-0x00000000007C0000-0x00000000007DC000-memory.dmp

                      Filesize

                      112KB

                    • memory/3108-73-0x00007FFBEE9A0000-0x00007FFBEF461000-memory.dmp

                      Filesize

                      10.8MB

                    • memory/3108-306-0x000000001C6C0000-0x000000001C6CC000-memory.dmp

                      Filesize

                      48KB

                    • memory/3108-305-0x000000001C310000-0x000000001C31E000-memory.dmp

                      Filesize

                      56KB

                    • memory/3108-303-0x00000000010A0000-0x00000000010AC000-memory.dmp

                      Filesize

                      48KB

                    • memory/3108-2-0x00000000028E0000-0x00000000028F0000-memory.dmp

                      Filesize

                      64KB

                    • memory/3108-1-0x00007FFBEE9A0000-0x00007FFBEF461000-memory.dmp

                      Filesize

                      10.8MB

                    • memory/5012-45-0x000001EC73FD0000-0x000001EC73FD1000-memory.dmp

                      Filesize

                      4KB

                    • memory/5012-54-0x000001EC73FD0000-0x000001EC73FD1000-memory.dmp

                      Filesize

                      4KB

                    • memory/5012-53-0x000001EC73FD0000-0x000001EC73FD1000-memory.dmp

                      Filesize

                      4KB

                    • memory/5012-50-0x000001EC73FD0000-0x000001EC73FD1000-memory.dmp

                      Filesize

                      4KB

                    • memory/5012-51-0x000001EC73FD0000-0x000001EC73FD1000-memory.dmp

                      Filesize

                      4KB

                    • memory/5012-49-0x000001EC73FD0000-0x000001EC73FD1000-memory.dmp

                      Filesize

                      4KB

                    • memory/5012-44-0x000001EC73FD0000-0x000001EC73FD1000-memory.dmp

                      Filesize

                      4KB

                    • memory/5012-55-0x000001EC73FD0000-0x000001EC73FD1000-memory.dmp

                      Filesize

                      4KB

                    • memory/5012-52-0x000001EC73FD0000-0x000001EC73FD1000-memory.dmp

                      Filesize

                      4KB

                    • memory/5012-43-0x000001EC73FD0000-0x000001EC73FD1000-memory.dmp

                      Filesize

                      4KB