Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04/06/2024, 05:30
Static task
static1
Behavioral task
behavioral1
Sample
fe4dffba118410b2e1b57bef1b099ac643e338b2e8b34ee8252b5672038b7fbe.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
fe4dffba118410b2e1b57bef1b099ac643e338b2e8b34ee8252b5672038b7fbe.dll
Resource
win10v2004-20240508-en
General
-
Target
fe4dffba118410b2e1b57bef1b099ac643e338b2e8b34ee8252b5672038b7fbe.dll
-
Size
992KB
-
MD5
97cc324c3e119a1e92d47865a2e821be
-
SHA1
d95f93e8b18b901a3454370e35c2172cd47149da
-
SHA256
fe4dffba118410b2e1b57bef1b099ac643e338b2e8b34ee8252b5672038b7fbe
-
SHA512
f806756c4ccb464ec2866e9aee8ee21cf81bb88cfa906e0055ebb352e287280b8f75b06bef987a524b401a935f0b7dd81be3221716edfe6dda59e9fad7f0dcc4
-
SSDEEP
12288:nrHGPv5SmptEDmUWuVZkxikdXcqifhqq:6PvQmptPUBDkxBdXcHfhq
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Iphtcfjrejti = "\"C:\\Users\\Admin\\AppData\\Roaming\\ZcygL\\mstsc.exe\"" Process not Found -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\system32\4064\BitLockerDeviceEncryption.exe cmd.exe File opened for modification C:\Windows\system32\4064\BitLockerDeviceEncryption.exe cmd.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3020 schtasks.exe -
Modifies registry class 13 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\ms-settings Process not Found Key deleted \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\ms-settings\shell\open\command Process not Found Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\ms-settings\shell\open\command Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\ms-settings\shell\open\command\DelegateExecute Process not Found Key deleted \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\ms-settings Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Process not Found Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Process not Found Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\ms-settings\shell Process not Found Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\ms-settings\shell\open Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\ms-settings\shell\open\command\ = "C:\\Windows\\system32\\cmd.exe /c C:\\Users\\Admin\\AppData\\Local\\Temp\\0azG20t.cmd" Process not Found Key deleted \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\ms-settings\shell Process not Found Key deleted \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\ms-settings\shell\open Process not Found -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2752 rundll32.exe 2752 rundll32.exe 2752 rundll32.exe 2752 rundll32.exe 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeShutdownPrivilege 3488 Process not Found Token: SeCreatePagefilePrivilege 3488 Process not Found Token: SeShutdownPrivilege 3488 Process not Found Token: SeCreatePagefilePrivilege 3488 Process not Found Token: SeShutdownPrivilege 3488 Process not Found Token: SeCreatePagefilePrivilege 3488 Process not Found Token: SeShutdownPrivilege 3488 Process not Found Token: SeCreatePagefilePrivilege 3488 Process not Found Token: SeShutdownPrivilege 3488 Process not Found Token: SeCreatePagefilePrivilege 3488 Process not Found Token: SeShutdownPrivilege 3488 Process not Found Token: SeCreatePagefilePrivilege 3488 Process not Found Token: SeShutdownPrivilege 3488 Process not Found Token: SeCreatePagefilePrivilege 3488 Process not Found -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3488 Process not Found 3488 Process not Found -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3488 Process not Found -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 3488 wrote to memory of 3044 3488 Process not Found 89 PID 3488 wrote to memory of 3044 3488 Process not Found 89 PID 3488 wrote to memory of 3312 3488 Process not Found 90 PID 3488 wrote to memory of 3312 3488 Process not Found 90 PID 3488 wrote to memory of 952 3488 Process not Found 91 PID 3488 wrote to memory of 952 3488 Process not Found 91 PID 3488 wrote to memory of 2708 3488 Process not Found 92 PID 3488 wrote to memory of 2708 3488 Process not Found 92 PID 3488 wrote to memory of 2984 3488 Process not Found 93 PID 3488 wrote to memory of 2984 3488 Process not Found 93 PID 3488 wrote to memory of 3012 3488 Process not Found 94 PID 3488 wrote to memory of 3012 3488 Process not Found 94 PID 3488 wrote to memory of 2020 3488 Process not Found 95 PID 3488 wrote to memory of 2020 3488 Process not Found 95 PID 3488 wrote to memory of 4928 3488 Process not Found 96 PID 3488 wrote to memory of 4928 3488 Process not Found 96 PID 3488 wrote to memory of 804 3488 Process not Found 98 PID 3488 wrote to memory of 804 3488 Process not Found 98 PID 804 wrote to memory of 1904 804 cmd.exe 100 PID 804 wrote to memory of 1904 804 cmd.exe 100 PID 3488 wrote to memory of 888 3488 Process not Found 101 PID 3488 wrote to memory of 888 3488 Process not Found 101 PID 3488 wrote to memory of 2204 3488 Process not Found 102 PID 3488 wrote to memory of 2204 3488 Process not Found 102 PID 3488 wrote to memory of 624 3488 Process not Found 103 PID 3488 wrote to memory of 624 3488 Process not Found 103 PID 3488 wrote to memory of 4652 3488 Process not Found 104 PID 3488 wrote to memory of 4652 3488 Process not Found 104 PID 3488 wrote to memory of 4180 3488 Process not Found 105 PID 3488 wrote to memory of 4180 3488 Process not Found 105 PID 3488 wrote to memory of 2572 3488 Process not Found 107 PID 3488 wrote to memory of 2572 3488 Process not Found 107 PID 2572 wrote to memory of 2044 2572 fodhelper.exe 108 PID 2572 wrote to memory of 2044 2572 fodhelper.exe 108 PID 2044 wrote to memory of 3020 2044 cmd.exe 110 PID 2044 wrote to memory of 3020 2044 cmd.exe 110 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fe4dffba118410b2e1b57bef1b099ac643e338b2e8b34ee8252b5672038b7fbe.dll,#11⤵
- Suspicious behavior: EnumeratesProcesses
PID:2752
-
C:\Windows\system32\MdSched.exeC:\Windows\system32\MdSched.exe1⤵PID:3044
-
C:\Windows\system32\ResetEngine.exeC:\Windows\system32\ResetEngine.exe1⤵PID:3312
-
C:\Windows\system32\cleanmgr.exeC:\Windows\system32\cleanmgr.exe1⤵PID:952
-
C:\Windows\system32\MdRes.exeC:\Windows\system32\MdRes.exe1⤵PID:2708
-
C:\Windows\system32\mavinject.exeC:\Windows\system32\mavinject.exe1⤵PID:2984
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe1⤵PID:3012
-
C:\Windows\system32\mstsc.exeC:\Windows\system32\mstsc.exe1⤵PID:2020
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\IFtQW.cmd1⤵PID:4928
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Delete /F /TN "User_Feed_Synchronization-{3a9698a7-8b59-5789-8186-33aeee771cee}"1⤵
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Windows\system32\schtasks.exeschtasks.exe /Delete /F /TN "User_Feed_Synchronization-{3a9698a7-8b59-5789-8186-33aeee771cee}"2⤵PID:1904
-
-
C:\Windows\system32\DTUHandler.exeC:\Windows\system32\DTUHandler.exe1⤵PID:888
-
C:\Windows\system32\printui.exeC:\Windows\system32\printui.exe1⤵PID:2204
-
C:\Windows\system32\RdpSaProxy.exeC:\Windows\system32\RdpSaProxy.exe1⤵PID:624
-
C:\Windows\system32\BitLockerDeviceEncryption.exeC:\Windows\system32\BitLockerDeviceEncryption.exe1⤵PID:4652
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\zhYP.cmd1⤵
- Drops file in System32 directory
PID:4180
-
C:\Windows\System32\fodhelper.exe"C:\Windows\System32\fodhelper.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\0azG20t.cmd2⤵
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\system32\schtasks.exeschtasks.exe /Create /F /TN "Niazd" /SC minute /MO 60 /TR "C:\Windows\system32\4064\BitLockerDeviceEncryption.exe" /RL highest3⤵
- Creates scheduled task(s)
PID:3020
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
141B
MD52870586af24bb4d0a35b96a1cd285b6d
SHA131e0f5434710a0de35dde06b92a2453b32491912
SHA2562c443f1c00e10fbd0c240b44f783c9ea0342b47a67ee71b5a1a2a59f79963a9a
SHA512738f5ed861a9c57224f97b29df55c465000e6da18be9bb865c717332fe276fdc35443f7abd8fe7fd58fc76bba08647870c1e4bf232397531945ba35b48fc66d1
-
Filesize
996KB
MD5a47bb5f75d25fafae3427e67e53cc0ae
SHA1fd5043c734b409f65764c8810d21d5df36355639
SHA2568e6183b1a9b49fcb609e2e8a52662551dc2ba185b31a7272ca71f4e236aa6109
SHA51220f569cda64abc323762037e2aca6ba7021703ffc628800fcd28360d634df60851577d505159c53183b6829c9a597a69db75bcba3e025267ed8d0aeb2b68a259
-
Filesize
226B
MD5ad7b4fd6929ed12ba001e65597fd0e51
SHA116128e6dd4655df11fbb114043596092283ce0e6
SHA2569e47e984003ecde432cc5fff9620759de15df3f5a0844c96b54036290327a9b7
SHA512713392e53d427d6b0501b011a4fb806e0548d5fadce3ea2ff73b246e4a199d718e9741881b49b26dff7444600315ac325ac7c525dbd7a9f625fff7d77d746c9f
-
Filesize
996KB
MD57fa8ae0fb2c324f68d77e6bd3a7f6d74
SHA1c86fecbf718d722a2b5e5db9f2a12933a8d8c4ee
SHA25673716db138302cec9a0d1c7c5abc00a26e54c3b20b5e50de976bbb08103d0fc4
SHA512f5441b597b64fa0724d751ee3c3462ef05b0b6b663a9ab767d02fce19dc0a4088153b8b2b5cc5690a5a2ad9367e3f6598ad381371be2b1ff6aa133f0bb8285a4
-
Filesize
210B
MD547a903184848b493a250ba2911627728
SHA11a163135a185a9e495907ad728e3a245204aecde
SHA256106980cc47dd60f7501665e7688439446f0ef04fb1c86f7077a268a3ccb28ffd
SHA5125b35c8b4db2428ff1fe8ea8c834d10ddcec747ef86810ece80652c40d49fbe654db9676229420c5afa196d30702661b7c58249c4151d90503a9c797673ffeea5
-
Filesize
892B
MD5222ec960fb9549ff48ea46dfef760e96
SHA14a72825f78f4d9a08d2a07577ea064158e394b46
SHA25627148177ef5829c817b31dccc51fb66ce6f62a1d3cd72c17d9ee714cc8b6832d
SHA51241a6cd789829c5e70e165259fec926baa662e89e0d0aa8441b3ebf7efe995cc51d4496a52d5c5c767d4205a5b886763606268f6f8bcf15c86a4d0da5e8c99989
-
Filesize
1.5MB
MD53a26640414cee37ff5b36154b1a0b261
SHA1e0c28b5fdf53a202a7543b67bbc97214bad490ed
SHA2561d1b6b2edac7ac6494c9eecda3afb804f679d7190f4d1a80929380e85743823f
SHA51276fc70ead57ddacd3dbcec1a4772bd46924d30b30018a36b13052d2f7272cc86b63bf85d5e4ec04aac08630d4b2637ca6e7d35c08ce6b675d63ed011f7d95ba2