Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/07/2024, 04:39

General

  • Target

    e117aee9a31901b0865be8c2e3f36c7009b7d325cdbff77829ea81cc6654daf4.exe

  • Size

    300KB

  • MD5

    7149335ef0bbf3bb00ed73e81733c900

  • SHA1

    fc2901e58bbd79c16adfeb94f9c0342dd0a0381f

  • SHA256

    e117aee9a31901b0865be8c2e3f36c7009b7d325cdbff77829ea81cc6654daf4

  • SHA512

    9d7d84d4ad0d6fe20dbe632f98a7692b69544668fadb3f90d08a90b8c0bc22c06b808f201fb543429eee0ce5003b05478beabccbb2769efda8c00796a2971eef

  • SSDEEP

    6144:caQbbFhjLoqmVQP8C/ldsGKQVj5r3AFIF2jq3VfRD9oOkO/uvvX211:cTxcwZRKO3A5uRfWvvY

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 35 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e117aee9a31901b0865be8c2e3f36c7009b7d325cdbff77829ea81cc6654daf4.exe
    "C:\Users\Admin\AppData\Local\Temp\e117aee9a31901b0865be8c2e3f36c7009b7d325cdbff77829ea81cc6654daf4.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:752
    • C:\Users\Admin\AppData\Local\Temp\e117aee9a31901b0865be8c2e3f36c7009b7d325cdbff77829ea81cc6654daf4.exe
      "C:\Users\Admin\AppData\Local\Temp\e117aee9a31901b0865be8c2e3f36c7009b7d325cdbff77829ea81cc6654daf4.exe" C:\Users\Admin\AppData\Local\Temp\e117aee9a31901b0865be8c2e3f36c7009b7d325cdbff77829ea81cc6654daf4.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2764
    • C:\Program Files (x86)\Adobe\acrotray.exe
      "C:\Program Files (x86)\Adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\e117aee9a31901b0865be8c2e3f36c7009b7d325cdbff77829ea81cc6654daf4.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2236
      • C:\Program Files (x86)\Adobe\acrotray.exe
        "C:\Program Files (x86)\Adobe\acrotray.exe" C:\Program Files (x86)\Adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\e117aee9a31901b0865be8c2e3f36c7009b7d325cdbff77829ea81cc6654daf4.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2152
      • C:\Program Files (x86)\Adobe\acrotray .exe
        "C:\Program Files (x86)\Adobe\acrotray .exe" C:\Program Files (x86)\Adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\e117aee9a31901b0865be8c2e3f36c7009b7d325cdbff77829ea81cc6654daf4.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4344
        • C:\Program Files (x86)\Adobe\acrotray .exe
          "C:\Program Files (x86)\Adobe\acrotray .exe" C:\Program Files (x86)\Adobe\acrotray .exe" C:\Program Files (x86)\Adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\e117aee9a31901b0865be8c2e3f36c7009b7d325cdbff77829ea81cc6654daf4.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1444
  • C:\Program Files (x86)\Internet Explorer\ielowutil.exe
    "C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding
    1⤵
      PID:820
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:5000
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5000 CREDAT:17410 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:3480
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5000 CREDAT:82954 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:4036
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5000 CREDAT:82958 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:3528

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Adobe\acrotray .exe

      Filesize

      329KB

      MD5

      5f853ede3e0346bad34986fb6c1fd01e

      SHA1

      9e6a87ecd3a141e8bdfd4e66d777d52be49a544c

      SHA256

      e8a7b2f50ac80f2a5a22c25ee625e80e7c00cdd3852f462f09a8424e83597257

      SHA512

      6a45a519f02d1c910061308218c7c18fe108eb50fa94b2f6fd8f2605096e9d9dacb65ef363024b05c378cfeefcff660123b06b15c3b234c71037a47641f4b100

    • C:\Program Files (x86)\Adobe\acrotray.exe

      Filesize

      308KB

      MD5

      81b5176be0d7b1edbee0451aea7a1a48

      SHA1

      8bd21ec940d430c6ba5a5f942b870e523062bdb7

      SHA256

      55b5e45e6e51d3b756462de3e794f77cdad44521d745cff4b2135550d6714dcd

      SHA512

      9f29d182de13bb0fb46efeabb0346620e4d49e07afb6d4d03921d12c54b76273f82237f7adb080542dace31d20e485ad6991e9920bc9c50533d982e9acadce5e

    • memory/752-1-0x0000000010000000-0x0000000010010000-memory.dmp

      Filesize

      64KB