Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    92s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/07/2024, 00:30

General

  • Target

    2d5e67a538870c7a1555c1bbbd1ca000N.exe

  • Size

    1.7MB

  • MD5

    2d5e67a538870c7a1555c1bbbd1ca000

  • SHA1

    4a863c367c0f2babd990423bd99f72be7ca8a6b6

  • SHA256

    2ce263cd843426febc9df739dab122cbda0d0846884d9f68df683524383ebafd

  • SHA512

    6f690a42428644adefe6d919138badd87b5e3e912eb7ec163c310acdb998f5f3644e9bab8d4d919bc1b8ed01fa554e98cba92b54a13b9fab3153a24d50304d99

  • SSDEEP

    24576:OXdVtTj2i64T+jdxQCfgOFD3WSwd2QtBBw6xxhVxQtmibjOhZaiRu/4oMaop0UNJ:mbTChxKCnFnQXBbrtgb/iQvu0UHOK

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2d5e67a538870c7a1555c1bbbd1ca000N.exe
    "C:\Users\Admin\AppData\Local\Temp\2d5e67a538870c7a1555c1bbbd1ca000N.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1584
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Admin0.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4356
      • C:\Users\Admin\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1428
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Admin1.bat" "
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1896
          • C:\Users\Admin\AppData\Roaming\Microsoft\Defender\launch.exe
            "C:\Users\Admin\AppData\Roaming\Microsoft\Defender\launch.exe" /i 1428
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:3460
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Admin2.bat" "
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:4208
              • C:\Users\Admin\AppData\Local\Temp\wtmps.exe
                "C:\Users\Admin\AppData\Local\Temp\wtmps.exe"
                7⤵
                • Executes dropped EXE
                • Drops file in System32 directory
                • Suspicious use of WriteProcessMemory
                PID:3808
                • C:\Windows\SysWOW64\mscaps.exe
                  "C:\Windows\system32\mscaps.exe" /C:\Users\Admin\AppData\Local\Temp\wtmps.exe
                  8⤵
                  • Executes dropped EXE
                  PID:936
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Admin1.bat" "
      2⤵
        PID:4280

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\CA16.tmp

      Filesize

      406B

      MD5

      37512bcc96b2c0c0cf0ad1ed8cfae5cd

      SHA1

      edf7f17ce28e1c4c82207cab8ca77f2056ea545c

      SHA256

      27e678bf5dc82219d6edd744f0b82567a26e40f8a9dcd6487205e13058e3ed1f

      SHA512

      6d4252ab5aa441a76ce2127224fefcb221259ab4d39f06437b269bd6bfdaae009c8f34e9603ec734159553bc9f1359bdd70316cd426d73b171a9f17c41077641

    • C:\Users\Admin\AppData\Local\Temp\wtmps.exe

      Filesize

      276KB

      MD5

      75c1467042b38332d1ea0298f29fb592

      SHA1

      f92ea770c2ddb04cf0d20914578e4c482328f0f8

      SHA256

      3b20c853d4ca23240cd338b8cab16f1027c540ddfe9c4ffdca1624d2f923b373

      SHA512

      5c47c59ad222e2597ccdf2c100853c48f022e933f44c279154346eacf9e7e6f54214ada541d43a10424035f160b56131aab206c11512a9fd6ea614fbd3160aa0

    • C:\Users\Admin\AppData\Roaming\Microsoft\Defender\launch.exe

      Filesize

      172KB

      MD5

      daac1781c9d22f5743ade0cb41feaebf

      SHA1

      e2549eeeea42a6892b89d354498fcaa8ffd9cac4

      SHA256

      6a7093440420306cf7de53421a67af8a1094771e0aab9535acbd748d08ed766c

      SHA512

      190a7d5291e20002f996edf1e04456bfdff8b7b2f4ef113178bd42a9e5fd89fe6d410ae2c505de0358c4f53f9654ac1caaa8634665afa6d9691640dd4ee86160

    • C:\Users\Admin\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe

      Filesize

      896KB

      MD5

      887241c9ef1d6df96cd1e648f897c8a0

      SHA1

      a8ae7f5fb49507727fba9ae9014ff843992a9a44

      SHA256

      6012844bd16803dfd877e680c216d5909bf75d93086ce50e8d2c567fbb12a03d

      SHA512

      1da34c47918e1b0baa66c8a963297fe57203ed16609e37a3985540f6882056020781a02c0e9f19f20d54b759e091da78c9a1a6303faee0cc991f17c387a5e08f

    • C:\Users\Admin\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe

      Filesize

      1.7MB

      MD5

      604736cbbe3629998b4c10ad8db76cbc

      SHA1

      22a836f46c8eeefae15c61be84ce3f97b4f2cc94

      SHA256

      45a2df03cce673b0da61b9072bccd87394ff3514d0751444200e033f0a6c4c21

      SHA512

      bb68788e66e4b195d59a9139eb9009775b689d5c2795b829f8f370f9413acf6336a0ad85f5eef5cbe226e739c42d95eaef832a50816c6579896797f2f2a24613

    • C:\Users\Admin\AppData\Roaming\Temp\Admin0.bat

      Filesize

      129B

      MD5

      d1073c9b34d1bbd570928734aacff6a5

      SHA1

      78714e24e88d50e0da8da9d303bec65b2ee6d903

      SHA256

      b3c704b1a728004fc5e25899d72930a7466d7628dd6ddd795b3000897dfa4020

      SHA512

      4f2b9330e30fcc55245dc5d12311e105b2b2b9d607fbfc4a203c69a740006f0af58d6a01e2da284575a897528da71a2e61a7321034755b78feb646c8dd12347f

    • C:\Users\Admin\AppData\Roaming\Temp\Admin1.bat

      Filesize

      126B

      MD5

      4f677ad861f2153ff05f17c2eef751e2

      SHA1

      5e9efab56fe791cca95ae474eae7725b2f004775

      SHA256

      0d54429b2cab26de8785085d1aff9146c8776a20b4d6be7dc77506e8add4e7e5

      SHA512

      b954d4a65c317b9dc7665e20e203afaa7c144870124410bfcf095caf1e83ebd16c812ff51735aab771a4ff0011fa8e20db5b075bc26e7cfeb28bef0be0f7b97a

    • C:\Users\Admin\AppData\Roaming\Temp\Admin1.bat

      Filesize

      240B

      MD5

      a498e64a26b1155d928b395baa4f4c0a

      SHA1

      79920dbb7411c94e0e3bf0c8328286fd1a5d433b

      SHA256

      d814096abb7c200e382aabff2f1e061e4a6fefa8cc2b11141e31ddf3a481c01b

      SHA512

      b3b6d0bc3758563c3cf5f0179c12aa94745846010710b34888642b9f9c75c7153eb29647a6d9de839d470959be058a203c468877a5334754961d6a74d540a955

    • C:\Users\Admin\AppData\Roaming\Temp\Admin2.bat

      Filesize

      102B

      MD5

      3ca08f080a7a28416774d80552d4aa08

      SHA1

      0b5f0ba641204b27adac4140fd45dce4390dbf24

      SHA256

      4e7d460b8dc9f2c01b4c5a16fb956aced10127bc940e8039a80c6455901ea1f0

      SHA512

      0c64aa462ff70473ef763ec392296fe0ea59b5340c26978531a416732bc3845adf9ca7b673cb7b4ba40cc45674351206096995c43600fccbbbe64e51b6019f01

    • C:\Users\Admin\AppData\Roaming\Temp\mydll.dll

      Filesize

      388KB

      MD5

      e1e47695a0b98432911311352b63eaed

      SHA1

      836142e550301e0fc13c1a047aae5a2f4481d7cd

      SHA256

      c67ed34d9254b31e611ee830125c3f2572a1e686f82deb69e1580fb9a4614cd0

      SHA512

      da49234ee2e1d8f9956ba59d4a49fe04d3ab154f5dd60cf7a6c72e9d42defe8a4b0aeb38845444fe3a8d9c80976467d2101f7c992a48f98f6a9317d0e61ca961

    • C:\Users\Admin\AppData\Roaming\Temp\mydll.dll

      Filesize

      388KB

      MD5

      8d7db101a7211fe3309dc4dc8cf2dd0a

      SHA1

      6c2781eadf53b3742d16dab2f164baf813f7ac85

      SHA256

      93db7c9699594caa19490280842fbebec3877278c92128b92e63d75fcd01397a

      SHA512

      8b139d447068519997f7bbc2c7c2fe3846b89ae1fba847258277c9ab92a93583b28fae7ffa444768929ed5852cc914c0270446cbf0bd20aca49bde6b6f809c83

    • C:\Windows\SysWOW64\mscaps.exe

      Filesize

      200KB

      MD5

      78d3c8705f8baf7d34e6a6737d1cfa18

      SHA1

      9f09e248a29311dbeefae9d85937b13da042a010

      SHA256

      2c4c9ec8e9291ba5c73f641af2e0c3e1bbd257ac40d9fb9d3faab7cebc978905

      SHA512

      9a3c3175276da58f1bc8d1138e63238c8d8ccfbfa1a8a1338e88525eca47f8d745158bb34396b7c3f25e4296be5f45a71781da33ad0bbdf7ad88a9c305b85609

    • memory/1584-0-0x0000000010000000-0x0000000010015000-memory.dmp

      Filesize

      84KB