Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
08/07/2024, 20:24
Static task
static1
Behavioral task
behavioral1
Sample
Boleto-10-2011.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Boleto-10-2011.exe
Resource
win10v2004-20240704-en
General
-
Target
Boleto-10-2011.exe
-
Size
353KB
-
MD5
681abf81004f57b2930a7fade361c160
-
SHA1
43707fceb0fda0045e2ad1522375f66a25a9a5ad
-
SHA256
7e07c36e47c45f16faf8f41e4805396dc99445a3c563258d9a6ed65b638e073a
-
SHA512
15ad726644ffb33279afe2beef362de6f077247e6487b589bcffebb45ab00608286448d0d02c16ef4c3c486dee374e9fc95988641f3c4702be7e442494178585
-
SSDEEP
6144:uAkg2vhVMaJTXPiap/ZMUxgdUCxlZn+aC1meyUGimMxSkOZbX:u02ZVvx6aTMLX/5W1meyUGp8POt
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\Control Panel\International\Geo\Nation Boleto-10-2011.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RDSound = "C:\\Users\\Admin\\AppData\\Roaming\\Huawei3g.exe" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{B4506FEB-3DA2-11EF-A0CA-5EABFE216D3F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key Boleto-10-2011.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ Boleto-10-2011.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" Boleto-10-2011.exe -
Modifies registry key 1 TTPs 2 IoCs
pid Process 4132 reg.exe 2784 reg.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3940 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3940 iexplore.exe 3940 iexplore.exe 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3100 wrote to memory of 3812 3100 Boleto-10-2011.exe 85 PID 3100 wrote to memory of 3812 3100 Boleto-10-2011.exe 85 PID 3100 wrote to memory of 3812 3100 Boleto-10-2011.exe 85 PID 3100 wrote to memory of 2864 3100 Boleto-10-2011.exe 87 PID 3100 wrote to memory of 2864 3100 Boleto-10-2011.exe 87 PID 3100 wrote to memory of 2864 3100 Boleto-10-2011.exe 87 PID 3812 wrote to memory of 2784 3812 cmd.exe 89 PID 3812 wrote to memory of 2784 3812 cmd.exe 89 PID 3812 wrote to memory of 2784 3812 cmd.exe 89 PID 2864 wrote to memory of 1932 2864 cmd.exe 90 PID 2864 wrote to memory of 1932 2864 cmd.exe 90 PID 2864 wrote to memory of 1932 2864 cmd.exe 90 PID 1932 wrote to memory of 4132 1932 cmd.exe 91 PID 1932 wrote to memory of 4132 1932 cmd.exe 91 PID 1932 wrote to memory of 4132 1932 cmd.exe 91 PID 3940 wrote to memory of 2556 3940 iexplore.exe 94 PID 3940 wrote to memory of 2556 3940 iexplore.exe 94 PID 3940 wrote to memory of 2556 3940 iexplore.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\Boleto-10-2011.exe"C:\Users\Admin\AppData\Local\Temp\Boleto-10-2011.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Nreg.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:3812 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v RDSound /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Huawei3g.exe" /f3⤵
- Adds Run key to start application
- Modifies registry key
PID:2784
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\NUac.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\System32\cmd.exe /k C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- UAC bypass
- Modifies registry key
PID:4132
-
-
-
-
C:\Program Files (x86)\Internet Explorer\ielowutil.exe"C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding1⤵PID:4660
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3940 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3940 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2556
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
164B
MD5c80c14c9b9ffd63a2ed8037940d75103
SHA13f24e10b213bd483067709c8c4f7b75c29464eff
SHA256236f2acb03d56106f0e6b693108f25ed2eb9b7d0503a84e6948e797f8c15dd6b
SHA512f51619a769fc86bc091bd1a534c6cac5d8c426ddd9784fd98bb23b7f0c699fcc473722dffa1196391c3e92f4647ce96de4b3326c25f49014552b0346a6f4e2c9
-
Filesize
118B
MD5c515911f3c9c95c71397ec270d03dc09
SHA15ed1e95629a721abeb30666d699798fe8d3399a3
SHA25607589b5e7fa05ac15a19128dab9bbedcd485492f7e41b3bbcc97a6430610265c
SHA512055617212f73e2b32ba13ea6d5c114c38c9a9d633d797f16fa7aacf121b68b44e93700a632f21f37ad805df4157b93aab9dc4dbe9662863444aece3449c0d367
-
Filesize
129KB
MD5073bea567f124dc7454897430b79a865
SHA188b02e94559e907c824ef8c208095652220aef01
SHA256871edddb9774bb7a7f247418e75f3692f9297207df6d94bc749a0b2b745f2402
SHA5125f038bae6bcb5c8e504d1d26ada43920ca83d0a9fd1fa1d1c428fceb09783946c48f07d0b11c00cfc9d2764e26a0cc9b91738a1f3de586a861a403ce171acd1a