Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
22/07/2024, 09:47
Behavioral task
behavioral1
Sample
95c8d93702e7063e7db9555969545540N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
95c8d93702e7063e7db9555969545540N.exe
Resource
win10v2004-20240704-en
General
-
Target
95c8d93702e7063e7db9555969545540N.exe
-
Size
304KB
-
MD5
95c8d93702e7063e7db9555969545540
-
SHA1
31fb6c9b10e2a75634fe6fbd3fbe23eeb85bf569
-
SHA256
de4ec1fb441ef422cd308ccb378f490ee728f8dc89b7f0cac4056c72e5474960
-
SHA512
d6b960ce8dbfaa9b3684f2a1e7dfbeb5f634e13c00131b9263880612215441abebd42a1c94766ec83307a1009bcc423f70942be9978cde80fa40b08510f9a9fa
-
SSDEEP
3072:fHUm8QyMWSVCqwT1h+popOOfaPOx5P+m/pNdhZ1QYUdqz:fQqwJh+6pAkGm/pH1gdq
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation 95c8d93702e7063e7db9555969545540N.exe -
Executes dropped EXE 4 IoCs
pid Process 4488 95c8d93702e7063e7db9555969545540N.exe 1592 WindowsService.exe 1540 WindowsService.exe 1172 WindowsService.exe -
resource yara_rule behavioral2/memory/4824-0-0x0000000000400000-0x000000000044C000-memory.dmp upx behavioral2/memory/4488-3-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/files/0x000700000002349f-4.dat upx behavioral2/memory/4488-10-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4824-7-0x0000000002C10000-0x0000000002C11000-memory.dmp upx behavioral2/memory/4488-12-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4824-15-0x0000000000400000-0x000000000044C000-memory.dmp upx behavioral2/files/0x00070000000234a6-29.dat upx behavioral2/memory/1592-36-0x0000000000400000-0x000000000044C000-memory.dmp upx behavioral2/memory/4488-40-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/1592-46-0x0000000000400000-0x000000000044C000-memory.dmp upx behavioral2/memory/1592-55-0x0000000000400000-0x000000000044C000-memory.dmp upx behavioral2/memory/4488-56-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/1540-58-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sidebar = "C:\\Users\\Admin\\AppData\\Roaming\\SystemWindows\\WindowsService.exe" reg.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4824 set thread context of 4488 4824 95c8d93702e7063e7db9555969545540N.exe 93 PID 1592 set thread context of 1540 1592 WindowsService.exe 99 PID 1592 set thread context of 1172 1592 WindowsService.exe 100 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 63 IoCs
description pid Process Token: SeDebugPrivilege 1540 WindowsService.exe Token: SeDebugPrivilege 1540 WindowsService.exe Token: SeDebugPrivilege 1540 WindowsService.exe Token: SeDebugPrivilege 1540 WindowsService.exe Token: SeDebugPrivilege 1540 WindowsService.exe Token: SeDebugPrivilege 1540 WindowsService.exe Token: SeDebugPrivilege 1540 WindowsService.exe Token: SeDebugPrivilege 1540 WindowsService.exe Token: SeDebugPrivilege 1540 WindowsService.exe Token: SeDebugPrivilege 1540 WindowsService.exe Token: SeDebugPrivilege 1540 WindowsService.exe Token: SeDebugPrivilege 1540 WindowsService.exe Token: SeDebugPrivilege 1540 WindowsService.exe Token: SeDebugPrivilege 1540 WindowsService.exe Token: SeDebugPrivilege 1540 WindowsService.exe Token: SeDebugPrivilege 1540 WindowsService.exe Token: SeDebugPrivilege 1540 WindowsService.exe Token: SeDebugPrivilege 1540 WindowsService.exe Token: SeDebugPrivilege 1540 WindowsService.exe Token: SeDebugPrivilege 1540 WindowsService.exe Token: SeDebugPrivilege 1540 WindowsService.exe Token: SeDebugPrivilege 1540 WindowsService.exe Token: SeDebugPrivilege 1540 WindowsService.exe Token: SeDebugPrivilege 1540 WindowsService.exe Token: SeDebugPrivilege 1540 WindowsService.exe Token: SeDebugPrivilege 1540 WindowsService.exe Token: SeDebugPrivilege 1540 WindowsService.exe Token: SeDebugPrivilege 1540 WindowsService.exe Token: SeDebugPrivilege 1540 WindowsService.exe Token: SeDebugPrivilege 1540 WindowsService.exe Token: SeDebugPrivilege 1540 WindowsService.exe Token: SeDebugPrivilege 1540 WindowsService.exe Token: SeDebugPrivilege 1540 WindowsService.exe Token: SeDebugPrivilege 1540 WindowsService.exe Token: SeDebugPrivilege 1540 WindowsService.exe Token: SeDebugPrivilege 1540 WindowsService.exe Token: SeDebugPrivilege 1540 WindowsService.exe Token: SeDebugPrivilege 1540 WindowsService.exe Token: SeDebugPrivilege 1540 WindowsService.exe Token: SeDebugPrivilege 1540 WindowsService.exe Token: SeDebugPrivilege 1540 WindowsService.exe Token: SeDebugPrivilege 1540 WindowsService.exe Token: SeDebugPrivilege 1540 WindowsService.exe Token: SeDebugPrivilege 1540 WindowsService.exe Token: SeDebugPrivilege 1540 WindowsService.exe Token: SeDebugPrivilege 1540 WindowsService.exe Token: SeDebugPrivilege 1540 WindowsService.exe Token: SeDebugPrivilege 1540 WindowsService.exe Token: SeDebugPrivilege 1540 WindowsService.exe Token: SeDebugPrivilege 1540 WindowsService.exe Token: SeDebugPrivilege 1540 WindowsService.exe Token: SeDebugPrivilege 1540 WindowsService.exe Token: SeDebugPrivilege 1540 WindowsService.exe Token: SeDebugPrivilege 1540 WindowsService.exe Token: SeDebugPrivilege 1540 WindowsService.exe Token: SeDebugPrivilege 1540 WindowsService.exe Token: SeDebugPrivilege 1540 WindowsService.exe Token: SeDebugPrivilege 1540 WindowsService.exe Token: SeDebugPrivilege 1540 WindowsService.exe Token: SeDebugPrivilege 1540 WindowsService.exe Token: SeDebugPrivilege 1540 WindowsService.exe Token: SeDebugPrivilege 1540 WindowsService.exe Token: SeDebugPrivilege 1540 WindowsService.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4824 95c8d93702e7063e7db9555969545540N.exe 4488 95c8d93702e7063e7db9555969545540N.exe 1592 WindowsService.exe 1540 WindowsService.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 4824 wrote to memory of 4488 4824 95c8d93702e7063e7db9555969545540N.exe 93 PID 4824 wrote to memory of 4488 4824 95c8d93702e7063e7db9555969545540N.exe 93 PID 4824 wrote to memory of 4488 4824 95c8d93702e7063e7db9555969545540N.exe 93 PID 4824 wrote to memory of 4488 4824 95c8d93702e7063e7db9555969545540N.exe 93 PID 4824 wrote to memory of 4488 4824 95c8d93702e7063e7db9555969545540N.exe 93 PID 4824 wrote to memory of 4488 4824 95c8d93702e7063e7db9555969545540N.exe 93 PID 4824 wrote to memory of 4488 4824 95c8d93702e7063e7db9555969545540N.exe 93 PID 4824 wrote to memory of 4488 4824 95c8d93702e7063e7db9555969545540N.exe 93 PID 4488 wrote to memory of 4872 4488 95c8d93702e7063e7db9555969545540N.exe 94 PID 4488 wrote to memory of 4872 4488 95c8d93702e7063e7db9555969545540N.exe 94 PID 4488 wrote to memory of 4872 4488 95c8d93702e7063e7db9555969545540N.exe 94 PID 4872 wrote to memory of 1344 4872 cmd.exe 97 PID 4872 wrote to memory of 1344 4872 cmd.exe 97 PID 4872 wrote to memory of 1344 4872 cmd.exe 97 PID 4488 wrote to memory of 1592 4488 95c8d93702e7063e7db9555969545540N.exe 98 PID 4488 wrote to memory of 1592 4488 95c8d93702e7063e7db9555969545540N.exe 98 PID 4488 wrote to memory of 1592 4488 95c8d93702e7063e7db9555969545540N.exe 98 PID 1592 wrote to memory of 1540 1592 WindowsService.exe 99 PID 1592 wrote to memory of 1540 1592 WindowsService.exe 99 PID 1592 wrote to memory of 1540 1592 WindowsService.exe 99 PID 1592 wrote to memory of 1540 1592 WindowsService.exe 99 PID 1592 wrote to memory of 1540 1592 WindowsService.exe 99 PID 1592 wrote to memory of 1540 1592 WindowsService.exe 99 PID 1592 wrote to memory of 1540 1592 WindowsService.exe 99 PID 1592 wrote to memory of 1540 1592 WindowsService.exe 99 PID 1592 wrote to memory of 1172 1592 WindowsService.exe 100 PID 1592 wrote to memory of 1172 1592 WindowsService.exe 100 PID 1592 wrote to memory of 1172 1592 WindowsService.exe 100 PID 1592 wrote to memory of 1172 1592 WindowsService.exe 100 PID 1592 wrote to memory of 1172 1592 WindowsService.exe 100 PID 1592 wrote to memory of 1172 1592 WindowsService.exe 100 PID 1592 wrote to memory of 1172 1592 WindowsService.exe 100 PID 1592 wrote to memory of 1172 1592 WindowsService.exe 100 PID 1592 wrote to memory of 1172 1592 WindowsService.exe 100 PID 1592 wrote to memory of 1172 1592 WindowsService.exe 100 PID 1592 wrote to memory of 1172 1592 WindowsService.exe 100 PID 1592 wrote to memory of 1172 1592 WindowsService.exe 100 PID 1592 wrote to memory of 1172 1592 WindowsService.exe 100 PID 1592 wrote to memory of 1172 1592 WindowsService.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\95c8d93702e7063e7db9555969545540N.exe"C:\Users\Admin\AppData\Local\Temp\95c8d93702e7063e7db9555969545540N.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Users\Admin\AppData\Local\Temp\95c8d93702e7063e7db9555969545540N.exe"C:\Users\Admin\AppData\Local\Temp\95c8d93702e7063e7db9555969545540N.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\DRQCK.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "sidebar" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\SystemWindows\WindowsService.exe" /f4⤵
- Adds Run key to start application
PID:1344
-
-
-
C:\Users\Admin\AppData\Roaming\SystemWindows\WindowsService.exe"C:\Users\Admin\AppData\Roaming\SystemWindows\WindowsService.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Users\Admin\AppData\Roaming\SystemWindows\WindowsService.exe"C:\Users\Admin\AppData\Roaming\SystemWindows\WindowsService.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1540
-
-
C:\Users\Admin\AppData\Roaming\SystemWindows\WindowsService.exe"C:\Users\Admin\AppData\Roaming\SystemWindows\WindowsService.exe"4⤵
- Executes dropped EXE
PID:1172
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
304KB
MD595c8d93702e7063e7db9555969545540
SHA131fb6c9b10e2a75634fe6fbd3fbe23eeb85bf569
SHA256de4ec1fb441ef422cd308ccb378f490ee728f8dc89b7f0cac4056c72e5474960
SHA512d6b960ce8dbfaa9b3684f2a1e7dfbeb5f634e13c00131b9263880612215441abebd42a1c94766ec83307a1009bcc423f70942be9978cde80fa40b08510f9a9fa
-
Filesize
157B
MD5f6a90c20834f271a907a4e2bc28184c2
SHA136c9d1602b74f622346fbb22693597d7889df48d
SHA25673f29cd953eee40cea4de67842556ffd96efe8094a6a9b70f33a35df2582febd
SHA51239cabae19fe1faa37455e4bd242c868be60d6252b07f01224b3f7501c3cf734e503300b840d83381a452707cab6df2f95f920655884be56d4024676b26943804
-
Filesize
304KB
MD59b06e48f758bfc679bcfb47960788983
SHA1a02b3c02d4823ac4d9fb83d0a5e3f58be23e2a9a
SHA2563910daf45ac6b87ae775f7e171c3a39a78bec6ea91f3b6de8f42ffab5e076976
SHA512573134e3a158eb276af1bb5ff131410d35ae5c89d7da344bac383e44358f928a5b8bec12db627241157d28a9143d3842b2caeaf373657140da5d0d0164cf10f7