Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04/06/2024, 01:27
Static task
static1
Behavioral task
behavioral1
Sample
31c14cdf08f79c8dd23da19ea5913c8d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
31c14cdf08f79c8dd23da19ea5913c8d.exe
Resource
win10v2004-20240508-en
General
-
Target
31c14cdf08f79c8dd23da19ea5913c8d.exe
-
Size
36.7MB
-
MD5
31c14cdf08f79c8dd23da19ea5913c8d
-
SHA1
024d9bf8c6416d201e132eae3d82e7d3de804b5c
-
SHA256
19e4b8511307b215721c7c6a7150bfca078045360d258355f7e172a0a357ec43
-
SHA512
8c1d2e69cd42234553ec4bc28fad79dd4b739b134073162084c19ec13f400d4fd167af39612a3edb611cd9e70ee504f05f77625f5cb4b6c2cd6e3c354657df9f
-
SSDEEP
786432:pDsCef8iSTCkgTVaG79BNQUN36YP/+W6B36hMx02DouwT:pD8w2Z79B+UN36K+WU6D2kuw
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation 31c14cdf08f79c8dd23da19ea5913c8d.tmp -
Executes dropped EXE 3 IoCs
pid Process 2400 31c14cdf08f79c8dd23da19ea5913c8d.tmp 3288 7z.exe 3896 7z.exe -
Loads dropped DLL 5 IoCs
pid Process 2400 31c14cdf08f79c8dd23da19ea5913c8d.tmp 2400 31c14cdf08f79c8dd23da19ea5913c8d.tmp 2400 31c14cdf08f79c8dd23da19ea5913c8d.tmp 3288 7z.exe 3896 7z.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 31c14cdf08f79c8dd23da19ea5913c8d.tmp Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz 31c14cdf08f79c8dd23da19ea5913c8d.tmp -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch 31c14cdf08f79c8dd23da19ea5913c8d.tmp Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" 31c14cdf08f79c8dd23da19ea5913c8d.tmp Key created \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Software\Microsoft\Internet Explorer\IESettingSync 31c14cdf08f79c8dd23da19ea5913c8d.tmp Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" 31c14cdf08f79c8dd23da19ea5913c8d.tmp -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeRestorePrivilege 3288 7z.exe Token: 35 3288 7z.exe Token: SeSecurityPrivilege 3288 7z.exe Token: SeSecurityPrivilege 3288 7z.exe Token: SeRestorePrivilege 3896 7z.exe Token: 35 3896 7z.exe Token: SeSecurityPrivilege 3896 7z.exe Token: SeSecurityPrivilege 3896 7z.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2400 31c14cdf08f79c8dd23da19ea5913c8d.tmp 2400 31c14cdf08f79c8dd23da19ea5913c8d.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 4160 wrote to memory of 2400 4160 31c14cdf08f79c8dd23da19ea5913c8d.exe 81 PID 4160 wrote to memory of 2400 4160 31c14cdf08f79c8dd23da19ea5913c8d.exe 81 PID 4160 wrote to memory of 2400 4160 31c14cdf08f79c8dd23da19ea5913c8d.exe 81 PID 2400 wrote to memory of 3288 2400 31c14cdf08f79c8dd23da19ea5913c8d.tmp 82 PID 2400 wrote to memory of 3288 2400 31c14cdf08f79c8dd23da19ea5913c8d.tmp 82 PID 2400 wrote to memory of 3896 2400 31c14cdf08f79c8dd23da19ea5913c8d.tmp 84 PID 2400 wrote to memory of 3896 2400 31c14cdf08f79c8dd23da19ea5913c8d.tmp 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\31c14cdf08f79c8dd23da19ea5913c8d.exe"C:\Users\Admin\AppData\Local\Temp\31c14cdf08f79c8dd23da19ea5913c8d.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Users\Admin\AppData\Local\Temp\is-PKFEP.tmp\31c14cdf08f79c8dd23da19ea5913c8d.tmp"C:\Users\Admin\AppData\Local\Temp\is-PKFEP.tmp\31c14cdf08f79c8dd23da19ea5913c8d.tmp" /SL5="$50164,37611458,1148416,C:\Users\Admin\AppData\Local\Temp\31c14cdf08f79c8dd23da19ea5913c8d.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\is-8RO6O.tmp\7z.exe"C:\Users\Admin\AppData\Local\Temp\is-8RO6O.tmp\7z.exe" x C:\Users\Admin\AppData\Local\Temp\is-8RO6O.tmp\2TGOTUHZV.7z -pqwerty0987 -oC:\Users\Admin\AppData\Local\Temp\is-8RO6O.tmp\CDD1A1C7-191B-7BC1-5C7D-33473DD19D8F3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:3288
-
-
C:\Users\Admin\AppData\Local\Temp\is-8RO6O.tmp\7z.exe"C:\Users\Admin\AppData\Local\Temp\is-8RO6O.tmp\7z.exe" x C:\Users\Admin\AppData\Local\Temp\is-8RO6O.tmp\DBQM4FAUZ.7z -pqwerty0987 -oC:\Users\Admin\AppData\Local\Temp\is-8RO6O.tmp\CDD1A1C7-191B-7BC1-5C7D-33473DD19D8F3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:3896
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
499KB
MD53175cec55609ca0f6b8ec96519a77c47
SHA119ad5d8e54f573f9eab9315fda4fa8474adc10ea
SHA256dc552ce2e691dad50b2ff62197928a9c34bf2bf2a14e7b16bd76a18275e3fe00
SHA5128d72da712206721ac4c11663f0b04284d3d067f135fde30f8ae50c1e764a1663f4e7f9916c3ec721bebab2c0b9b43d68a9b8104266920743ce96e5ca89ef1140
-
Filesize
1.7MB
MD56416fc6c11f5775f474607ee7eec2935
SHA14d1703ee174f5f6b20274864ec2cb1c6b6c8529b
SHA256ed594e74aa38cdb08d38807eb626b28ffd9eb8c73f75b303031598963331ff55
SHA512816725ea67f43041692a58e6fec75c9485cc8fe56cf97894b6b6e570ad18863edd9d7d047aaca33d8c93af26913bd1f7e1da10b869dab981d7626a3b0920d1bf
-
Filesize
532KB
MD5ed53b28ab53811c06879e8fc5e1000ce
SHA1e4e4d66639097862a59410decf5db146ceaa5d19
SHA2567135e78794c5ceacb094afcadca57755cc3801591552776f1a717bbdd65605a7
SHA512be92e468682ee681436c31d8f39db6585185bf8f8adefae8f6646b65c7e9339e54a027ac7e63d9356cb4602d5020664b023a74486c4da629cdc97b5cff61985f
-
C:\Users\Admin\AppData\Local\Temp\is-8RO6O.tmp\CDD1A1C7-191B-7BC1-5C7D-33473DD19D8F\Install\info.xml
Filesize1KB
MD5f1a0d79bc6bcbb684b634a22a6e4b892
SHA13e25c55cd492509f159cc22b5e1638949e502a63
SHA25611599d4b685ed4af5a28ffb8b9793cecfa0f069084e053d95020d7be60aa9f69
SHA51291897508e0f9cb6ba926a933250cfa6a56742b7540bf260d953e4f77301a62a6f678827bf655abed644b2fd822107c61da24b0b0237b743adabfa5e8ba3177cd
-
C:\Users\Admin\AppData\Local\Temp\is-8RO6O.tmp\CDD1A1C7-191B-7BC1-5C7D-33473DD19D8F\install\0\offer0.html
Filesize16KB
MD56ac56705899b7e41664135444ae3b736
SHA104cd5dc01cdc322b79ef8309e4ccdc852871c327
SHA2564b6f5643ef970105bf33ae47d53001fdbeb939b79d22acc77124a98c9c38d6d4
SHA512c5884f4a8bf1e6ab7aa6bf7f680a527cfc31ff5ad7b7834cce6d673b4b316dfbf55358042528692f3448369cc169d46bc014241e602c4f2c4fd4e666b0fe5a46
-
Filesize
32.4MB
MD50ba639980fbb48eb931a461b2953974d
SHA198143706e9f5568411b56d139013349fafcd1573
SHA256b4193b80034515e841c7599522c38e6e8db227216b784ebef7dc89af80ae65f9
SHA512b700ac29f6a12ecba8bdf700197d6a6ffb2a52bb192c3236c59fead6068c2f2d93df52d1fe348659006ab3c0206da9aebd5e5114e6ce9d988a782e9ea6fd6bd1
-
Filesize
28KB
MD5077cb4461a2767383b317eb0c50f5f13
SHA1584e64f1d162398b7f377ce55a6b5740379c4282
SHA2568287d0e287a66ee78537c8d1d98e426562b95c50f569b92cea9ce36a9fa57e64
SHA512b1fcb0265697561ef497e6a60fcee99dc5ea0cf02b4010da9f5ed93bce88bdfea6bfe823a017487b8059158464ea29636aad8e5f9dd1e8b8a1b6eaaab670e547
-
Filesize
2.2MB
MD5c663759adbcf6c47f9fec3a835a97c92
SHA14fb9b1f6ec51d4c3674977020c1723f6641e07d7
SHA2561e9b2bf3b80fe61a32f66097fd371db197ddde1a2ea5b6120f7b39f76a186288
SHA512afd0661b7f70d22e147affc9fe20ee9df8a2234ce3c23e8a262d2e9c148317caf19d9c68d77aba02151774bb55d316b0316719b9e5cc6cff54bb4fcad258ee20
-
Filesize
3.2MB
MD5cbf5b2bddfd6a5bffd958e11427abc41
SHA1f6d675d9f600f0934fae373762f2901bf72b312c
SHA25643982e6d11f2be798d0d3317dbd337d55b48a63f4400964fdf906556aebde1ba
SHA512d1db4894656e910d5ca26073df07b287d91f0dd91e855419a7308e6b4390929dc0d8cf36b72e865aa49942904e5eaf5c59572f47221f4e2f87f266405d112ba8