Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
25/07/2024, 16:03
Static task
static1
Behavioral task
behavioral1
Sample
supe-07.24.exe
Resource
win7-20240708-en
General
-
Target
supe-07.24.exe
-
Size
26.2MB
-
MD5
a0b333d4fb900d449533f57f8c15692a
-
SHA1
b2bce81901a05a9ddcdc8a32eef966790aa3663d
-
SHA256
f8749982a378cef8cb4180fc1d5ffb854ed49c12af056991ac12bd0caab94fc8
-
SHA512
cbff572dac16c23b86f8bbc18a364ed9d427f4cd121f80aed084213a2a4a06352214706d8b1eac487f4e625e9d7d96663a4dc53b657a9dde1927f4d9e9b86586
-
SSDEEP
786432:ImSroc1dxc//jYChIgW3a47FNNUaVtlbZytIyLMdoFt:Ifoc1dxc//jYoIgW3a47FNNUItlb2
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x000400000002299c-14.dat acprotect -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation supe-07.24.exe -
Deletes itself 1 IoCs
pid Process 1300 Tomcat.exe -
Executes dropped EXE 1 IoCs
pid Process 1300 Tomcat.exe -
Loads dropped DLL 2 IoCs
pid Process 1300 Tomcat.exe 1300 Tomcat.exe -
resource yara_rule behavioral2/files/0x000400000002299c-14.dat upx behavioral2/memory/1300-31-0x0000000002330000-0x0000000002348000-memory.dmp upx behavioral2/memory/1300-35-0x0000000010000000-0x0000000010014000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language supe-07.24.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tomcat.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3628 supe-07.24.exe 3628 supe-07.24.exe 3628 supe-07.24.exe 3628 supe-07.24.exe 3628 supe-07.24.exe 3628 supe-07.24.exe 3628 supe-07.24.exe 3628 supe-07.24.exe 3628 supe-07.24.exe 3628 supe-07.24.exe 3628 supe-07.24.exe 3628 supe-07.24.exe 1300 Tomcat.exe 1300 Tomcat.exe 1300 Tomcat.exe 1300 Tomcat.exe 1300 Tomcat.exe 1300 Tomcat.exe 1300 Tomcat.exe 1300 Tomcat.exe 1300 Tomcat.exe 1300 Tomcat.exe 1300 Tomcat.exe 1300 Tomcat.exe 1300 Tomcat.exe 1300 Tomcat.exe 1300 Tomcat.exe 1300 Tomcat.exe 1300 Tomcat.exe 1300 Tomcat.exe 1300 Tomcat.exe 1300 Tomcat.exe 1300 Tomcat.exe 1300 Tomcat.exe 1300 Tomcat.exe 1300 Tomcat.exe 1300 Tomcat.exe 1300 Tomcat.exe 1300 Tomcat.exe 1300 Tomcat.exe 1300 Tomcat.exe 1300 Tomcat.exe 1300 Tomcat.exe 1300 Tomcat.exe 1300 Tomcat.exe 1300 Tomcat.exe 1300 Tomcat.exe 1300 Tomcat.exe 1300 Tomcat.exe 1300 Tomcat.exe 1300 Tomcat.exe 1300 Tomcat.exe 1300 Tomcat.exe 1300 Tomcat.exe 1300 Tomcat.exe 1300 Tomcat.exe 1300 Tomcat.exe 1300 Tomcat.exe 1300 Tomcat.exe 1300 Tomcat.exe 1300 Tomcat.exe 1300 Tomcat.exe 1300 Tomcat.exe 1300 Tomcat.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 1300 Tomcat.exe Token: SeLockMemoryPrivilege 1300 Tomcat.exe Token: SeCreateGlobalPrivilege 1300 Tomcat.exe Token: SeBackupPrivilege 1300 Tomcat.exe Token: SeRestorePrivilege 1300 Tomcat.exe Token: SeShutdownPrivilege 1300 Tomcat.exe Token: SeCreateTokenPrivilege 1300 Tomcat.exe Token: SeTakeOwnershipPrivilege 1300 Tomcat.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3628 supe-07.24.exe 3628 supe-07.24.exe 1300 Tomcat.exe 1300 Tomcat.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3628 wrote to memory of 1300 3628 supe-07.24.exe 87 PID 3628 wrote to memory of 1300 3628 supe-07.24.exe 87 PID 3628 wrote to memory of 1300 3628 supe-07.24.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\supe-07.24.exe"C:\Users\Admin\AppData\Local\Temp\supe-07.24.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Users\Admin\Documents\Tomcat.exe"C:\Users\Admin\Documents\Tomcat.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1300
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
148KB
MD5051d69a619adca3472e8d7c9b0c0eb5c
SHA16cc795ac90e43e408919e19ba6f5633863560459
SHA256feefc12464985e2057a4cbd54117e9414f2e00a284106fa38b62d63052a1f7dd
SHA51250daa3344aa4d86cdd22cf5736eec993467e6574c5e341cd0fd95757c739e167b6e76c744b29ae302d08c88d469fea0767640a9257f54f9dec2c5fbb87c23b71
-
Filesize
27KB
MD5849e9f3e59daf750db838e885d58c6fa
SHA1733cb105153e4b83160a52bfa2ddd95d750fb806
SHA256f94949a6c121a525f661dd8abd917eb37a5cf582c89e3a258170a15d30cc0cc2
SHA5123feff6db5fc5ae371a4ec60ce13a383668a5accac537a0ae56b9b5b7318a2d5bdb4b79286a519cad3610cb6d1f335a11c09a4d3165c147a00d5a7880ea23e173
-
Filesize
2.0MB
MD5af24b5e35a109e68d5afcc7d40f0d878
SHA18e043f8b713b7f3a38779a43a940d6a1db4eb9c7
SHA2566ec19cdef728be1a660556c4f3feb6df3a49ca0577689ac7b7683dda493b0c8a
SHA512102531ec4fc897e63223b3972e32c332920f810492e41c42f0d78ed5f6c5fe3ebc8732a15cd05a20e1fbab08bbfb6c136c0b9fd3b2370450c88c271331ba0860
-
Filesize
114B
MD542e114e670d36c778a7880bc3fa055a7
SHA1574064072f142ce658d6aba12618e60e891f22ea
SHA2562a6b818a1d81307131e18eec6c2c73ae3191391dd2cc169442dbe88d033a98ed
SHA5120f4680559a879daea70cde3b4aa283aefc3234951977475154e951fde40b56001c34a005bc87fda6619ac79d2e774dc128c432057fc5f5d6333dd86f90c4a67e