Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01/06/2024, 01:25
Static task
static1
Behavioral task
behavioral1
Sample
5178fc4896049fc29c0c1d6cca080705263debcaf47077829f0d8c882959de83.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5178fc4896049fc29c0c1d6cca080705263debcaf47077829f0d8c882959de83.exe
Resource
win10v2004-20240508-en
General
-
Target
5178fc4896049fc29c0c1d6cca080705263debcaf47077829f0d8c882959de83.exe
-
Size
54.0MB
-
MD5
8583a7539b74e8223d479f70c6b2de51
-
SHA1
b0c2427c0899c20b725b85dff1126a696c372857
-
SHA256
5178fc4896049fc29c0c1d6cca080705263debcaf47077829f0d8c882959de83
-
SHA512
2434db81b7356e1ded0b86d80b29fd87449225283f5d59313bb875107548b46d1c2513a92a0392cae0ec5aef01a135fd9c91fe7863df0634b0858bf85f7100dc
-
SSDEEP
98304:xDr5t+zSg6zFhQdQBFgtD75qFb0I+0PqkW:xvzTvQdQsD7sbS
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4848 TASLogin.exe 5108 TASLogin.exe -
Loads dropped DLL 1 IoCs
pid Process 4848 TASLogin.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\IFfmsjhgsda = "C:\\Users\\Public\\Documents\\1YHYHX\\TASLogin.exe" TASLogin.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4848 set thread context of 5108 4848 TASLogin.exe 95 -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe -
Modifies registry class 33 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 7800310000000000a8582e611100557365727300640009000400efbe874f7748c1582d0b2e000000c70500000000010000000000000000003a0000000000f7c54b0055007300650072007300000040007300680065006c006c00330032002e0064006c006c002c002d0032003100380031003300000014000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 = 7800310000000000c1582d0b11004d7573696300640009000400efbe874fdb49c1582d0b2e000000fd0500000000010000000000000000003a00000000004415e3004d007500730069006300000040007300680065006c006c00330032002e0064006c006c002c002d0032003100380030003300000014000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 19002f433a5c000000000000000000000000000000000000000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000_Classes\Local Settings OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\NodeSlot = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 = 7c00310000000000c1582c0b11005075626c69630000660009000400efbe874fdb49c1582d0b2e000000f80500000000010000000000000000003c0000000000e3830c005000750062006c0069006300000040007300680065006c006c00330032002e0064006c006c002c002d0032003100380031003600000016000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Music" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags explorer.exe Key created \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0 = 5400310000000000c1582d0b100045554559455800003e0009000400efbec1582d0bc1582d0b2e000000d13302000000070000000000000000000000000000004415e300450055004500590045005800000016000000 explorer.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3912 explorer.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4272 5178fc4896049fc29c0c1d6cca080705263debcaf47077829f0d8c882959de83.exe 4272 5178fc4896049fc29c0c1d6cca080705263debcaf47077829f0d8c882959de83.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 5108 TASLogin.exe Token: SeShutdownPrivilege 5108 TASLogin.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 4272 5178fc4896049fc29c0c1d6cca080705263debcaf47077829f0d8c882959de83.exe 4272 5178fc4896049fc29c0c1d6cca080705263debcaf47077829f0d8c882959de83.exe 3912 explorer.exe 3912 explorer.exe 2840 OpenWith.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4272 wrote to memory of 1352 4272 5178fc4896049fc29c0c1d6cca080705263debcaf47077829f0d8c882959de83.exe 82 PID 4272 wrote to memory of 1352 4272 5178fc4896049fc29c0c1d6cca080705263debcaf47077829f0d8c882959de83.exe 82 PID 3912 wrote to memory of 4848 3912 explorer.exe 93 PID 3912 wrote to memory of 4848 3912 explorer.exe 93 PID 3912 wrote to memory of 4848 3912 explorer.exe 93 PID 4848 wrote to memory of 5108 4848 TASLogin.exe 95 PID 4848 wrote to memory of 5108 4848 TASLogin.exe 95 PID 4848 wrote to memory of 5108 4848 TASLogin.exe 95 PID 4848 wrote to memory of 5108 4848 TASLogin.exe 95 PID 4848 wrote to memory of 5108 4848 TASLogin.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\5178fc4896049fc29c0c1d6cca080705263debcaf47077829f0d8c882959de83.exe"C:\Users\Admin\AppData\Local\Temp\5178fc4896049fc29c0c1d6cca080705263debcaf47077829f0d8c882959de83.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Windows\explorer.exeC:\Windows\explorer.exe C:\Users\Public\Music\EUEYEX2⤵PID:1352
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Users\Public\Documents\1YHYHX\TASLogin.exe"C:\Users\Public\Documents\1YHYHX\TASLogin.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Users\Public\Documents\1YHYHX\TASLogin.exeC:\Users\Public\Documents\1YHYHX\TASLogin.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5108
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:432
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2840
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD5d5665ef0cf8ed15e02bd4e049303a777
SHA1195783839058c0d56a1006b1f7b1fb90f3f690a2
SHA25639d0f4532cdf0c09fb7d9cd3467d13f210ee2a94c0592178ae685e43a5121cb3
SHA51208367dce50ff7264467648ae68a926c09e74a426d9d322472f10912988d2bc3eaa542f94655c98a4ffa31b3fdf319cfd71a2b16cbf12a7bc43aec080be511808
-
Filesize
2.0MB
MD549ca5d6fb817f9af89284dc0be61a1cf
SHA17b3d00869d8fb0266783250046ba0c11cf45ce18
SHA256072eafa9fb2840f6588abe7b6c992d89192609996da4579951de4a0f4afec6c0
SHA512ca1a3fb0f164e74d58ee190ba31a7bc6d8ef50c4ab63ed6f8ebcbd7df339a1de2aa6393eb694e288ab32b32668413331cf86d6ee0e06ecad1a838498bbf4946d
-
Filesize
567KB
MD5e6a3caccbd9ca82f38a14bd0d4428240
SHA163937051b04582255505261d512a80ab40513b5f
SHA256ca1f26619b4483f4bda6b4d352b58a9c4f30c2e985e62e761b7d6f3440922264
SHA51221fbc87528dbc6b0f4aee165d9b812595ad1d30af434c401f4bc86d8bd6a209da950523cf00e7ae5fb1676350cd299d96e0e7a0255e6ebf53aeb7e51dd5d133e
-
Filesize
317KB
MD5dba8607e46cceda5dd57916a6bd8c7c7
SHA1c99c80cb5d46035b05a7dedb6e7d22946ce2dd94
SHA2568b44645c0bec9179cbb8ffd027395127d81ecc3b3ac5271b29e5221bc88ce10f
SHA51276dedd75107e24dabf30893a720af642e49c513a5a1ec80d5c9cb1baed8c7f29023455cf3aa75a5f7de90b542dec6d13490a03d482755a8d301402e5914dd9af
-
Filesize
130KB
MD5ebe2802b6afa5a08bcd83f8d5202fbc6
SHA17018f7332d98781236c3abc10097dae7dd53bb1f
SHA256c074b60774ca11085dcd7f34772f2979769dd9ae38b0766fa7b829bb68d02a4a
SHA512fb6d29a5889d2335ad348dfb772f2aa0d34caef4d0955c2924ad1bb1207ed24a06555341ad206ff10a035600a4299c0429952d6fc1305aebf2c82054628d6ed3
-
Filesize
135B
MD5b5ec2ad8561202d74f282f4b28058c2a
SHA145f440fc68502c144aa9e3e6a6f2fea2570d4e48
SHA2563cea6a95da065b2eb4beb8072a40645e59b0043ba56e9c61b3805f2fcc91bab3
SHA512cfed75a993fcefc1a6ff695edfb7b3fd9989d0ac6162032e41c6e73033e52b48def1ee6cfca740df781d36d796de1007e7086378e1d863f37415471155a15555
-
Filesize
131B
MD5b1c8e18ef45bda95066699592f0282ee
SHA1d405c7049fc91f6a77f182a89b71485c8820b535
SHA2562001cac8eb1b98508b99aa64d6963ba70bfb804d93af4c93760baf9a1943b599
SHA5127426a11857966766af3ec54c29e44a3eb4d4fe6efd72735be4ec5d0cd5f5366ad08f861c0f3e1ea9d2041ad4e886f4a792020de824bc77f37df10915cb4f78ca