Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
30/05/2024, 02:38
Static task
static1
Behavioral task
behavioral1
Sample
SEBarClt.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
SEBarClt.exe
Resource
win10v2004-20240426-en
General
-
Target
SEBarClt.exe
-
Size
795KB
-
MD5
5dfbaf5dbeb8f33c936de5493dd6a7b9
-
SHA1
aae268ee625544c42e5834a822ba82683dcbabeb
-
SHA256
5487495896ff389b9c0d950e1d158678cd028fb231517a02c1db918a7e172c1d
-
SHA512
2876a24573b452ba6fca8dd2c1782759f3e80d5182185ca8fa6d392cb90eb1f56d97116aec8a12a21490952cc71f5a7373105996426d234c1c16959e760ccbc6
-
SSDEEP
24576:w3qnzFNKEgNumi2S/JOc/cwKy1gmk4QqCs:w3fchUucwKyu/hs
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation SEBarClt.exe -
Executes dropped EXE 1 IoCs
pid Process 3964 Explorer.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\T: Explorer.exe File opened (read-only) \??\K: Explorer.exe File opened (read-only) \??\N: Explorer.exe File opened (read-only) \??\O: Explorer.exe File opened (read-only) \??\R: Explorer.exe File opened (read-only) \??\S: Explorer.exe File opened (read-only) \??\A: Explorer.exe File opened (read-only) \??\E: Explorer.exe File opened (read-only) \??\G: Explorer.exe File opened (read-only) \??\H: Explorer.exe File opened (read-only) \??\V: Explorer.exe File opened (read-only) \??\W: Explorer.exe File opened (read-only) \??\I: Explorer.exe File opened (read-only) \??\M: Explorer.exe File opened (read-only) \??\Q: Explorer.exe File opened (read-only) \??\U: Explorer.exe File opened (read-only) \??\X: Explorer.exe File opened (read-only) \??\Y: Explorer.exe File opened (read-only) \??\Z: Explorer.exe File opened (read-only) \??\B: Explorer.exe File opened (read-only) \??\J: Explorer.exe File opened (read-only) \??\L: Explorer.exe File opened (read-only) \??\P: Explorer.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\BootSys.log Explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor Explorer.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor Explorer.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Explorer.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 3964 Explorer.exe Token: SeIncBasePriorityPrivilege 3964 Explorer.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3964 Explorer.exe 3964 Explorer.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 3964 Explorer.exe 3964 Explorer.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3964 Explorer.exe 3964 Explorer.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4860 wrote to memory of 3964 4860 SEBarClt.exe 80 PID 4860 wrote to memory of 3964 4860 SEBarClt.exe 80 PID 4860 wrote to memory of 3964 4860 SEBarClt.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\SEBarClt.exe"C:\Users\Admin\AppData\Local\Temp\SEBarClt.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Users\Admin\AppData\Local\Temp\Explorer.exe"C:\Users\Admin\AppData\Local\Temp\Explorer.exe" "C:\Users\Admin\AppData\Local\Temp\SEBarClt.exe"2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Windows directory
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3964
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
795KB
MD55dfbaf5dbeb8f33c936de5493dd6a7b9
SHA1aae268ee625544c42e5834a822ba82683dcbabeb
SHA2565487495896ff389b9c0d950e1d158678cd028fb231517a02c1db918a7e172c1d
SHA5122876a24573b452ba6fca8dd2c1782759f3e80d5182185ca8fa6d392cb90eb1f56d97116aec8a12a21490952cc71f5a7373105996426d234c1c16959e760ccbc6