Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/06/2024, 00:16

General

  • Target

    82ee727dbca60cbc09889e28d542c88e7f41d1cbdb80321f196bc083684abb63.exe

  • Size

    206KB

  • MD5

    56a6af523a68f8f4f6076469cdfbef94

  • SHA1

    be01694779217eb4ebd4b30d0e89aca7f0a6f2f7

  • SHA256

    82ee727dbca60cbc09889e28d542c88e7f41d1cbdb80321f196bc083684abb63

  • SHA512

    9afadfcc585bd39297dfaf44b9be60624a812b03d68acdef582d5609e654e4294f05667f72c3402ca3a80790fd00880166774e6a6bc10bc1077be19e7fad99ae

  • SSDEEP

    3072:5vEfVUzSLhIVbV6i5LirrlZrHyrUHUckoMQ2RN6unL+:5vEN2U+T6i5LirrllHy4HUcMQY6K+

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Modifies Installed Components in the registry 2 TTPs 8 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\82ee727dbca60cbc09889e28d542c88e7f41d1cbdb80321f196bc083684abb63.exe
    "C:\Users\Admin\AppData\Local\Temp\82ee727dbca60cbc09889e28d542c88e7f41d1cbdb80321f196bc083684abb63.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4076
    • \??\c:\windows\system\explorer.exe
      c:\windows\system\explorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visiblity of hidden/system files in Explorer
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:5112
      • \??\c:\windows\system\spoolsv.exe
        c:\windows\system\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1744
        • \??\c:\windows\system\svchost.exe
          c:\windows\system\svchost.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visiblity of hidden/system files in Explorer
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:3448
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:3440
          • C:\Windows\SysWOW64\at.exe
            at 00:19 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
            5⤵
              PID:4892
            • C:\Windows\SysWOW64\at.exe
              at 00:20 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
              5⤵
                PID:4508
              • C:\Windows\SysWOW64\at.exe
                at 00:21 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
                5⤵
                  PID:2204
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3684 --field-trial-handle=2656,i,16940681401824032220,151921362336696246,262144 --variations-seed-version /prefetch:8
          1⤵
            PID:4600

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Roaming\mrsys.exe

            Filesize

            206KB

            MD5

            c9e4caa32d5b07e6cacb7b74d5fac13c

            SHA1

            438c669ab2848b4442556e29fd48808a1be6c46f

            SHA256

            fffdef22d95993e14e818d93c0ddf57710d317cdbc49299df13e4e44b970db60

            SHA512

            8a92ecf27feb45c121634a2a70a98d3df82a1358a9e48ee4c6b7baf3bcaf603b299f0ff9227ccbe3b738351c5a565dabc79c8e7830bd601bfe554b05c3f8b901

          • C:\Windows\System\spoolsv.exe

            Filesize

            206KB

            MD5

            e6f947759b19cc3399f28b0f0eda6bbb

            SHA1

            9a99a4f41f5e8b268864a8d0a437c575f80ec8f9

            SHA256

            2ed79e8d100779df6b06a9343304ae0c263b87acba77a78a9165f44f86893af0

            SHA512

            dd18fa52b3550a6a93db1dfb63fcf1c42cfa1dd9de7808cd58349f33a6f8dddda96fb60a11e4cca32562d267ebea52f4eedee98b12085974c6e85b5de9653772

          • C:\Windows\System\svchost.exe

            Filesize

            206KB

            MD5

            9c499f1d2afdf345bbdefa8bfdeb77a7

            SHA1

            45afc496c1b4eb79fbe3a26e860f1871ad25e038

            SHA256

            efae2b3f058b743c3a0dfd9f0c34d63d2527f7421ab164f1ac35c99b19f0c7c6

            SHA512

            a1756f1a87fc3433cfe42daa0d87d5ae9fb3afcdecf3a46f9e9acef84032c6309b17de7c36483eedd107979f6484d081f580215ed7355e252350320683224519

          • \??\c:\windows\system\explorer.exe

            Filesize

            206KB

            MD5

            2ee9df151c8cb5b7b07da382c26a94b9

            SHA1

            cbe01f613006670f5bb54a781c7f4c287c1938cd

            SHA256

            9411aa336254b9b4c71f4fa7b9d1b1821e0baeaab7f1e5a00bc8ca89e7ab232a

            SHA512

            7a57a83e4ea0f9ebb6262d6f8969f92e48c891eefbc193424a31affb2ecd6670d9b83398f1c352fc260912f32ec11a18d47fcb1cace97ac0cdd1a0629072b96c

          • memory/1744-36-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/3440-30-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/3440-33-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/4076-0-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/4076-37-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB