Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    51s
  • max time network
    55s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/06/2024, 01:16

General

  • Target

    f61841ea484b6c2ad65a5da96f7f4389250d9abe26a78044c39dd5a9a34a8243.exe

  • Size

    731KB

  • MD5

    f5504ec1c0593bf51b4375383b7a8766

  • SHA1

    ffc6b75ec2b99bf4ee74bd1704eb30cc46a2fc4e

  • SHA256

    f61841ea484b6c2ad65a5da96f7f4389250d9abe26a78044c39dd5a9a34a8243

  • SHA512

    af6f40f28c4aa2b9bb77c0de82b329fb446bdeda22ac98a1d57ea65abed175634b61de31d29842b3c26091163eb1c7514c8737e38326acc9093fbdff40b03a6f

  • SSDEEP

    12288:BuiJ2iNXu5LIXzgfljSKc7JrgTYi7NrlesSL/cCvSFTgyqNQiaXt0tHygOf:rJ1tu50X8flOrgFesSLkCUTzqNv

Score
8/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f61841ea484b6c2ad65a5da96f7f4389250d9abe26a78044c39dd5a9a34a8243.exe
    "C:\Users\Admin\AppData\Local\Temp\f61841ea484b6c2ad65a5da96f7f4389250d9abe26a78044c39dd5a9a34a8243.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4816
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\eJCCkY.exe"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2112
    • C:\Windows\System32\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\eJCCkY" /XML "C:\Users\Admin\AppData\Local\Temp\tmp8C13.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:936
    • C:\Users\Admin\AppData\Local\Temp\f61841ea484b6c2ad65a5da96f7f4389250d9abe26a78044c39dd5a9a34a8243.exe
      C:\Users\Admin\AppData\Local\Temp\f61841ea484b6c2ad65a5da96f7f4389250d9abe26a78044c39dd5a9a34a8243.exe
      2⤵
        PID:3020

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_u0bc4a5w.jp3.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Local\Temp\tmp8C13.tmp

      Filesize

      1KB

      MD5

      9b257f6634ba808a19fba62a4c6863da

      SHA1

      06be629924f33a2f9420e0a8beb73759ad845d16

      SHA256

      4026ce3a23bb01ee0ccaaa18bf05d2d9a92e8c4cba076fdb5d75db6cbd41e87c

      SHA512

      75b266ec4a77dfad7449455fb92a2320796ba405f23cdd6a66a700ab5a35c70834e4d1f8e727b7d6cbb5447fc9988734158405cf8e9cd034260f3a392230922d

    • memory/2112-24-0x00007FFBBBDC0000-0x00007FFBBC881000-memory.dmp

      Filesize

      10.8MB

    • memory/2112-11-0x00007FFBBBDC0000-0x00007FFBBC881000-memory.dmp

      Filesize

      10.8MB

    • memory/2112-30-0x00007FFBBBDC0000-0x00007FFBBC881000-memory.dmp

      Filesize

      10.8MB

    • memory/2112-19-0x00007FFBBBDC0000-0x00007FFBBC881000-memory.dmp

      Filesize

      10.8MB

    • memory/2112-17-0x000001DA4F3F0000-0x000001DA4F412000-memory.dmp

      Filesize

      136KB

    • memory/4816-6-0x000000001CB80000-0x000000001CD29000-memory.dmp

      Filesize

      1.7MB

    • memory/4816-2-0x00007FFBBBDC0000-0x00007FFBBC881000-memory.dmp

      Filesize

      10.8MB

    • memory/4816-3-0x0000000003A80000-0x0000000003A9C000-memory.dmp

      Filesize

      112KB

    • memory/4816-1-0x0000000000D70000-0x0000000000E2E000-memory.dmp

      Filesize

      760KB

    • memory/4816-5-0x000000001DC10000-0x000000001DC90000-memory.dmp

      Filesize

      512KB

    • memory/4816-0-0x00007FFBBBDC3000-0x00007FFBBBDC5000-memory.dmp

      Filesize

      8KB

    • memory/4816-26-0x000000001CB80000-0x000000001CD29000-memory.dmp

      Filesize

      1.7MB

    • memory/4816-27-0x00007FFBBBDC0000-0x00007FFBBC881000-memory.dmp

      Filesize

      10.8MB

    • memory/4816-4-0x0000000001F20000-0x0000000001F34000-memory.dmp

      Filesize

      80KB