Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/06/2024, 01:20
Static task
static1
Behavioral task
behavioral1
Sample
02361cd60f5298950adc950dff1a91b4.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
02361cd60f5298950adc950dff1a91b4.exe
Resource
win10v2004-20240226-en
General
-
Target
02361cd60f5298950adc950dff1a91b4.exe
-
Size
498KB
-
MD5
02361cd60f5298950adc950dff1a91b4
-
SHA1
dc56996cea0a4599f376111267f3b688f1e30362
-
SHA256
2426ae0a0e63fa1102ab84b0fa0ccb98c15546c6778512608c8e0ce06c73b71a
-
SHA512
563ec30e190ad988402128583cb2d642e0440e89eb286d44e62fb2a93d77a2c3430900515ff0fd0c2d007cc510dd10d3e933bbd7cc8141823abe39e58c62d88e
-
SSDEEP
12288:V+XGr3PS5oHUeJjF1dBzk27QRQ62e2p2iR9sadpHr1+XLiZ9g:l/HUUb7AQPRiCp
Malware Config
Signatures
-
Looks for VirtualBox Guest Additions in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions Service.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions TaskSTR.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions Service.exe -
Looks for VMWare Tools registry key 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\VMware, Inc.\VMware Tools TaskSTR.exe Key opened \REGISTRY\MACHINE\SOFTWARE\VMware, Inc.\VMware Tools Service.exe Key opened \REGISTRY\MACHINE\SOFTWARE\VMware, Inc.\VMware Tools Service.exe -
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TaskSTR.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TaskSTR.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Service.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Service.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Service.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Service.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 02361cd60f5298950adc950dff1a91b4.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation TaskSTR.exe -
Executes dropped EXE 4 IoCs
pid Process 516 ChaosNukerV1.exe 4560 TaskSTR.exe 3080 Service.exe 2356 Service.exe -
Loads dropped DLL 4 IoCs
pid Process 516 ChaosNukerV1.exe 516 ChaosNukerV1.exe 516 ChaosNukerV1.exe 516 ChaosNukerV1.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Service = "C:\\ProgramData\\Service.exe" TaskSTR.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 7 ip-api.com -
Maps connected drives based on registry 3 TTPs 6 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 Service.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum TaskSTR.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 TaskSTR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum Service.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 Service.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum Service.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2492 schtasks.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings 02361cd60f5298950adc950dff1a91b4.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 3708 02361cd60f5298950adc950dff1a91b4.exe 3708 02361cd60f5298950adc950dff1a91b4.exe 3708 02361cd60f5298950adc950dff1a91b4.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3708 02361cd60f5298950adc950dff1a91b4.exe Token: SeDebugPrivilege 4560 TaskSTR.exe Token: SeDebugPrivilege 3080 Service.exe Token: SeDebugPrivilege 2356 Service.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4088 OpenWith.exe 4004 OpenWith.exe 3772 OpenWith.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3708 wrote to memory of 516 3708 02361cd60f5298950adc950dff1a91b4.exe 95 PID 3708 wrote to memory of 516 3708 02361cd60f5298950adc950dff1a91b4.exe 95 PID 3708 wrote to memory of 516 3708 02361cd60f5298950adc950dff1a91b4.exe 95 PID 3708 wrote to memory of 4560 3708 02361cd60f5298950adc950dff1a91b4.exe 96 PID 3708 wrote to memory of 4560 3708 02361cd60f5298950adc950dff1a91b4.exe 96 PID 4560 wrote to memory of 2492 4560 TaskSTR.exe 98 PID 4560 wrote to memory of 2492 4560 TaskSTR.exe 98 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\02361cd60f5298950adc950dff1a91b4.exe"C:\Users\Admin\AppData\Local\Temp\02361cd60f5298950adc950dff1a91b4.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3708 -
C:\Users\Admin\AppData\Local\Temp\ChaosNukerV1.exe"C:\Users\Admin\AppData\Local\Temp\ChaosNukerV1.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:516
-
-
C:\Users\Admin\AppData\Local\Temp\TaskSTR.exe"C:\Users\Admin\AppData\Local\Temp\TaskSTR.exe"2⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Maps connected drives based on registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Service" /tr "C:\ProgramData\Service.exe"3⤵
- Creates scheduled task(s)
PID:2492
-
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4088
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4004
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3772
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4272 --field-trial-handle=2744,i,16362475727591565961,3676688664819797550,262144 --variations-seed-version /prefetch:81⤵PID:2040
-
C:\ProgramData\Service.exeC:\ProgramData\Service.exe1⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of AdjustPrivilegeToken
PID:3080
-
C:\ProgramData\Service.exeC:\ProgramData\Service.exe1⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of AdjustPrivilegeToken
PID:2356
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
871B
MD5386677f585908a33791517dfc2317f88
SHA12e6853b4560a9ac8a74cdd5c3124a777bc0d874e
SHA2567caf8779608c167ab6fa570df00c973aff6dee850bb63439770889a68c7cdae0
SHA512876d2269e25a4b2754bdf2c7e3c410050f885d7e6bd8abce41c5fc74ae1f8c549b2266dd1588c750f614063f36c8a8e5008cea610505897d04e4ef5c3adc52d9
-
Filesize
14KB
MD53a64e5539d5946623ac7da9c4f4e08e7
SHA1513d8bc28743734af9ea9172b7640e6390e68b54
SHA256398b2fd80e4455e3e6d857543e1bc3499db3c96dffd1e0cb2faa0f9648444859
SHA5128af1c81ad7523270598cf9bf07e8036e5c7e939d24178c5a852b792b3148cd6d6c764e47add3760ba008cc55396e55259a0d7005d27e5bd099ae44892f4240f0
-
Filesize
685KB
MD5081d9558bbb7adce142da153b2d5577a
SHA17d0ad03fbda1c24f883116b940717e596073ae96
SHA256b624949df8b0e3a6153fdfb730a7c6f4990b6592ee0d922e1788433d276610f3
SHA5122fdf035661f349206f58ea1feed8805b7f9517a21f9c113e7301c69de160f184c774350a12a710046e3ff6baa37345d319b6f47fd24fbba4e042d54014bee511
-
Filesize
153KB
MD5e4bbd1935c65a610e0089a68becd2127
SHA103ae50ba32bf10990b290c65fd69ca4d69fe0412
SHA2560be4845dad077a22d1b4d950de7c563163cb2f8775417e48a7e4af9c6a39e4b4
SHA512e00b90294126342c69a8dd4ea6bc8bf4c845c4e9962f30742e67057698838a45c7f84c51221cc4d812066a333e6502f912f2f106b982c21bc61476603a82ffba
-
Filesize
70KB
MD53552d418ce6394cdd9fc0fb06b883013
SHA152bbcb19cd100abbd261a4b4204dcec8c60e9646
SHA2560a87fede388ea48d2f21452058a40982a46d1601f9f7c6b1080b983078a59742
SHA51257d05e1f6c17efb54b5e5a8dc62b6a872b4fe7cb77c8f5f40a355a609b441cab615942961be006a7226486e41797669e309b34354d6d81d7a950a0459ab868ea
-
Filesize
41KB
MD5ff93596f8eb7ef75a0e94085c2422d20
SHA12de236113b35c78182df3a458e97ccf484c48e94
SHA2567f9a09ba18809a01e3396e57caa7495c6f8c282403acb76fd9bfcef30f4651d3
SHA5123417d8f28bdd220555d42ee588aefe8a0710a897ba4cee731c394335612b58ef015a466219818ae22cd48ab366e40fd89640a7ac230d3a020eea277d0bd046da