Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
92s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19/07/2024, 00:30
Static task
static1
Behavioral task
behavioral1
Sample
2d5e67a538870c7a1555c1bbbd1ca000N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2d5e67a538870c7a1555c1bbbd1ca000N.exe
Resource
win10v2004-20240709-en
General
-
Target
2d5e67a538870c7a1555c1bbbd1ca000N.exe
-
Size
1.7MB
-
MD5
2d5e67a538870c7a1555c1bbbd1ca000
-
SHA1
4a863c367c0f2babd990423bd99f72be7ca8a6b6
-
SHA256
2ce263cd843426febc9df739dab122cbda0d0846884d9f68df683524383ebafd
-
SHA512
6f690a42428644adefe6d919138badd87b5e3e912eb7ec163c310acdb998f5f3644e9bab8d4d919bc1b8ed01fa554e98cba92b54a13b9fab3153a24d50304d99
-
SSDEEP
24576:OXdVtTj2i64T+jdxQCfgOFD3WSwd2QtBBw6xxhVxQtmibjOhZaiRu/4oMaop0UNJ:mbTChxKCnFnQXBbrtgb/iQvu0UHOK
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation 2d5e67a538870c7a1555c1bbbd1ca000N.exe Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation WdExt.exe Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation launch.exe -
Executes dropped EXE 4 IoCs
pid Process 1428 WdExt.exe 3460 launch.exe 3808 wtmps.exe 936 mscaps.exe -
Loads dropped DLL 2 IoCs
pid Process 1584 2d5e67a538870c7a1555c1bbbd1ca000N.exe 1428 WdExt.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Defender Extension = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Defender\\launch.exe\"" launch.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\mscaps.exe wtmps.exe File opened for modification C:\Windows\SysWOW64\mscaps.exe wtmps.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 1584 2d5e67a538870c7a1555c1bbbd1ca000N.exe 1584 2d5e67a538870c7a1555c1bbbd1ca000N.exe 1428 WdExt.exe 1428 WdExt.exe 3460 launch.exe 3460 launch.exe 3460 launch.exe 3460 launch.exe 3460 launch.exe 3460 launch.exe 3460 launch.exe 3460 launch.exe 3460 launch.exe 3460 launch.exe 3460 launch.exe 3460 launch.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1584 wrote to memory of 4356 1584 2d5e67a538870c7a1555c1bbbd1ca000N.exe 86 PID 1584 wrote to memory of 4356 1584 2d5e67a538870c7a1555c1bbbd1ca000N.exe 86 PID 1584 wrote to memory of 4356 1584 2d5e67a538870c7a1555c1bbbd1ca000N.exe 86 PID 1584 wrote to memory of 4280 1584 2d5e67a538870c7a1555c1bbbd1ca000N.exe 88 PID 1584 wrote to memory of 4280 1584 2d5e67a538870c7a1555c1bbbd1ca000N.exe 88 PID 1584 wrote to memory of 4280 1584 2d5e67a538870c7a1555c1bbbd1ca000N.exe 88 PID 4356 wrote to memory of 1428 4356 cmd.exe 91 PID 4356 wrote to memory of 1428 4356 cmd.exe 91 PID 4356 wrote to memory of 1428 4356 cmd.exe 91 PID 1428 wrote to memory of 1896 1428 WdExt.exe 92 PID 1428 wrote to memory of 1896 1428 WdExt.exe 92 PID 1428 wrote to memory of 1896 1428 WdExt.exe 92 PID 1896 wrote to memory of 3460 1896 cmd.exe 94 PID 1896 wrote to memory of 3460 1896 cmd.exe 94 PID 1896 wrote to memory of 3460 1896 cmd.exe 94 PID 3460 wrote to memory of 4208 3460 launch.exe 95 PID 3460 wrote to memory of 4208 3460 launch.exe 95 PID 3460 wrote to memory of 4208 3460 launch.exe 95 PID 4208 wrote to memory of 3808 4208 cmd.exe 97 PID 4208 wrote to memory of 3808 4208 cmd.exe 97 PID 4208 wrote to memory of 3808 4208 cmd.exe 97 PID 3808 wrote to memory of 936 3808 wtmps.exe 98 PID 3808 wrote to memory of 936 3808 wtmps.exe 98 PID 3808 wrote to memory of 936 3808 wtmps.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d5e67a538870c7a1555c1bbbd1ca000N.exe"C:\Users\Admin\AppData\Local\Temp\2d5e67a538870c7a1555c1bbbd1ca000N.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Admin0.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Users\Admin\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Admin1.bat" "4⤵
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Users\Admin\AppData\Roaming\Microsoft\Defender\launch.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Defender\launch.exe" /i 14285⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Admin2.bat" "6⤵
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Users\Admin\AppData\Local\Temp\wtmps.exe"C:\Users\Admin\AppData\Local\Temp\wtmps.exe"7⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3808 -
C:\Windows\SysWOW64\mscaps.exe"C:\Windows\system32\mscaps.exe" /C:\Users\Admin\AppData\Local\Temp\wtmps.exe8⤵
- Executes dropped EXE
PID:936
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Admin1.bat" "2⤵PID:4280
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
406B
MD537512bcc96b2c0c0cf0ad1ed8cfae5cd
SHA1edf7f17ce28e1c4c82207cab8ca77f2056ea545c
SHA25627e678bf5dc82219d6edd744f0b82567a26e40f8a9dcd6487205e13058e3ed1f
SHA5126d4252ab5aa441a76ce2127224fefcb221259ab4d39f06437b269bd6bfdaae009c8f34e9603ec734159553bc9f1359bdd70316cd426d73b171a9f17c41077641
-
Filesize
276KB
MD575c1467042b38332d1ea0298f29fb592
SHA1f92ea770c2ddb04cf0d20914578e4c482328f0f8
SHA2563b20c853d4ca23240cd338b8cab16f1027c540ddfe9c4ffdca1624d2f923b373
SHA5125c47c59ad222e2597ccdf2c100853c48f022e933f44c279154346eacf9e7e6f54214ada541d43a10424035f160b56131aab206c11512a9fd6ea614fbd3160aa0
-
Filesize
172KB
MD5daac1781c9d22f5743ade0cb41feaebf
SHA1e2549eeeea42a6892b89d354498fcaa8ffd9cac4
SHA2566a7093440420306cf7de53421a67af8a1094771e0aab9535acbd748d08ed766c
SHA512190a7d5291e20002f996edf1e04456bfdff8b7b2f4ef113178bd42a9e5fd89fe6d410ae2c505de0358c4f53f9654ac1caaa8634665afa6d9691640dd4ee86160
-
Filesize
896KB
MD5887241c9ef1d6df96cd1e648f897c8a0
SHA1a8ae7f5fb49507727fba9ae9014ff843992a9a44
SHA2566012844bd16803dfd877e680c216d5909bf75d93086ce50e8d2c567fbb12a03d
SHA5121da34c47918e1b0baa66c8a963297fe57203ed16609e37a3985540f6882056020781a02c0e9f19f20d54b759e091da78c9a1a6303faee0cc991f17c387a5e08f
-
Filesize
1.7MB
MD5604736cbbe3629998b4c10ad8db76cbc
SHA122a836f46c8eeefae15c61be84ce3f97b4f2cc94
SHA25645a2df03cce673b0da61b9072bccd87394ff3514d0751444200e033f0a6c4c21
SHA512bb68788e66e4b195d59a9139eb9009775b689d5c2795b829f8f370f9413acf6336a0ad85f5eef5cbe226e739c42d95eaef832a50816c6579896797f2f2a24613
-
Filesize
129B
MD5d1073c9b34d1bbd570928734aacff6a5
SHA178714e24e88d50e0da8da9d303bec65b2ee6d903
SHA256b3c704b1a728004fc5e25899d72930a7466d7628dd6ddd795b3000897dfa4020
SHA5124f2b9330e30fcc55245dc5d12311e105b2b2b9d607fbfc4a203c69a740006f0af58d6a01e2da284575a897528da71a2e61a7321034755b78feb646c8dd12347f
-
Filesize
126B
MD54f677ad861f2153ff05f17c2eef751e2
SHA15e9efab56fe791cca95ae474eae7725b2f004775
SHA2560d54429b2cab26de8785085d1aff9146c8776a20b4d6be7dc77506e8add4e7e5
SHA512b954d4a65c317b9dc7665e20e203afaa7c144870124410bfcf095caf1e83ebd16c812ff51735aab771a4ff0011fa8e20db5b075bc26e7cfeb28bef0be0f7b97a
-
Filesize
240B
MD5a498e64a26b1155d928b395baa4f4c0a
SHA179920dbb7411c94e0e3bf0c8328286fd1a5d433b
SHA256d814096abb7c200e382aabff2f1e061e4a6fefa8cc2b11141e31ddf3a481c01b
SHA512b3b6d0bc3758563c3cf5f0179c12aa94745846010710b34888642b9f9c75c7153eb29647a6d9de839d470959be058a203c468877a5334754961d6a74d540a955
-
Filesize
102B
MD53ca08f080a7a28416774d80552d4aa08
SHA10b5f0ba641204b27adac4140fd45dce4390dbf24
SHA2564e7d460b8dc9f2c01b4c5a16fb956aced10127bc940e8039a80c6455901ea1f0
SHA5120c64aa462ff70473ef763ec392296fe0ea59b5340c26978531a416732bc3845adf9ca7b673cb7b4ba40cc45674351206096995c43600fccbbbe64e51b6019f01
-
Filesize
388KB
MD5e1e47695a0b98432911311352b63eaed
SHA1836142e550301e0fc13c1a047aae5a2f4481d7cd
SHA256c67ed34d9254b31e611ee830125c3f2572a1e686f82deb69e1580fb9a4614cd0
SHA512da49234ee2e1d8f9956ba59d4a49fe04d3ab154f5dd60cf7a6c72e9d42defe8a4b0aeb38845444fe3a8d9c80976467d2101f7c992a48f98f6a9317d0e61ca961
-
Filesize
388KB
MD58d7db101a7211fe3309dc4dc8cf2dd0a
SHA16c2781eadf53b3742d16dab2f164baf813f7ac85
SHA25693db7c9699594caa19490280842fbebec3877278c92128b92e63d75fcd01397a
SHA5128b139d447068519997f7bbc2c7c2fe3846b89ae1fba847258277c9ab92a93583b28fae7ffa444768929ed5852cc914c0270446cbf0bd20aca49bde6b6f809c83
-
Filesize
200KB
MD578d3c8705f8baf7d34e6a6737d1cfa18
SHA19f09e248a29311dbeefae9d85937b13da042a010
SHA2562c4c9ec8e9291ba5c73f641af2e0c3e1bbd257ac40d9fb9d3faab7cebc978905
SHA5129a3c3175276da58f1bc8d1138e63238c8d8ccfbfa1a8a1338e88525eca47f8d745158bb34396b7c3f25e4296be5f45a71781da33ad0bbdf7ad88a9c305b85609