Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    1s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/05/2024, 22:02

General

  • Target

    Unconfirmed 350474.exe

  • Size

    9KB

  • MD5

    50f642637caca8eb4bbffb3b13571ab5

  • SHA1

    ea0c699a53282df309ec5faa1ccf3ffa2b9e8088

  • SHA256

    2bbdd45bd37f311755c1355837cc76dd7d5bedea33496b4ff95f4951d290cda7

  • SHA512

    4fbda2e67a35bd898be55c1ac263fce0be48aeaf42749b09db5c3c6be76f053271ef6075693325f1a0bed9f78eab3951eb3ecf6f758fe7e722496e89514223fa

  • SSDEEP

    96:1COb1SXb0E4AFklfZT8kYlv7pUWh1cyc9tcyc5OraHYcY7obYViiALBktXmzNt:1n/AF+8kYt7DWa4osVRA8g

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Unconfirmed 350474.exe
    "C:\Users\Admin\AppData\Local\Temp\Unconfirmed 350474.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2388
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\GrhE6s29.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1412
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c wmic nic where physicaladapter=true get deviceid | findstr [0-9]
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:528
        • C:\Windows\System32\Wbem\WMIC.exe
          wmic nic where physicaladapter=true get deviceid
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:3076
        • C:\Windows\system32\findstr.exe
          findstr [0-9]
          4⤵
            PID:4428
        • C:\Windows\system32\reg.exe
          REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\01
          3⤵
            PID:4028
          • C:\Windows\system32\reg.exe
            REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\001
            3⤵
              PID:4680
            • C:\Windows\system32\reg.exe
              REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\0001
              3⤵
                PID:3408
              • C:\Windows\system32\reg.exe
                REG ADD HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\0001 /v NetworkAddress /t REG_SZ /d BAFBFB13DE10 /f
                3⤵
                  PID:2600
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c wmic nic where physicaladapter=true get deviceid | findstr [0-9]
                  3⤵
                  • Suspicious use of WriteProcessMemory
                  PID:2776
                  • C:\Windows\System32\Wbem\WMIC.exe
                    wmic nic where physicaladapter=true get deviceid
                    4⤵
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2276
                  • C:\Windows\system32\findstr.exe
                    findstr [0-9]
                    4⤵
                      PID:3948
                  • C:\Windows\system32\reg.exe
                    REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\01
                    3⤵
                      PID:2360
                    • C:\Windows\system32\reg.exe
                      REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\001
                      3⤵
                        PID:1948
                      • C:\Windows\system32\reg.exe
                        REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\0001
                        3⤵
                          PID:3120
                        • C:\Windows\system32\reg.exe
                          REG ADD HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\0001 /v PnPCapabilities /t REG_DWORD /d 24 /f
                          3⤵
                            PID:3248
                          • C:\Windows\system32\cmd.exe
                            C:\Windows\system32\cmd.exe /c "wmic nic where (netconnectionid like '%') get netconnectionid,netconnectionstatus /format:csv"
                            3⤵
                            • Suspicious use of WriteProcessMemory
                            PID:680
                            • C:\Windows\System32\Wbem\WMIC.exe
                              wmic nic where (netconnectionid like '%') get netconnectionid,netconnectionstatus /format:csv
                              4⤵
                                PID:2396
                            • C:\Windows\system32\netsh.exe
                              netsh interface set interface name="Ethernet" disable
                              3⤵
                                PID:4032
                          • C:\Windows\System32\svchost.exe
                            C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s Netman
                            1⤵
                              PID:4712

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Temp\GrhE6s29.bat

                              Filesize

                              2KB

                              MD5

                              43bdcdcb95be88bcbe6f42c218a0de1b

                              SHA1

                              1b77b07f807f635ce23948f2c4c7182d4f2b311d

                              SHA256

                              342be7270c39848f1ec9a58430cdc8d1d5fd59687b3a1afd17cf0682a3d660e8

                              SHA512

                              f216b68b9d993cc428f48bd7535ed6441ef70b7941f4cdb68820d53d85254b37f4fda2a5869eb49ded5d85c264a7cbc3952989c2d95090a403effbf62de8567e

                            • memory/2388-1-0x00007FFAA3CC3000-0x00007FFAA3CC5000-memory.dmp

                              Filesize

                              8KB

                            • memory/2388-0-0x0000000000E60000-0x0000000000E68000-memory.dmp

                              Filesize

                              32KB

                            • memory/2388-1-0x00007FFAA3CC3000-0x00007FFAA3CC5000-memory.dmp

                              Filesize

                              8KB

                            • memory/2388-0-0x0000000000E60000-0x0000000000E68000-memory.dmp

                              Filesize

                              32KB