Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    121s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/08/2024, 16:14

General

  • Target

    ad7f288c6c3528a5b8508f7bca6c1050N.exe

  • Size

    2.0MB

  • MD5

    ad7f288c6c3528a5b8508f7bca6c1050

  • SHA1

    7e949316c76cfffd93533b49478244738f2a31fe

  • SHA256

    c1764bac71bc705b900e232da0e2c17fdfc94fc3f1d125105785cc3727433886

  • SHA512

    439ad4522557c90cefb651358fcb452adf4c21461a9290791bd9fae27bd796fd17f7761d1ac7d90a67221b9d31673341ea70071db7449bc4efce992b67cfe9c3

  • SSDEEP

    49152:OFUcx88PWPOpX0SF5+9ycUWgm3M4cIHQHkJYXZOT7yGc:O+K88uPCHT+9y9WcqIOPyGc

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ad7f288c6c3528a5b8508f7bca6c1050N.exe
    "C:\Users\Admin\AppData\Local\Temp\ad7f288c6c3528a5b8508f7bca6c1050N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1972
    • C:\Users\Admin\AppData\Local\Temp\6C71.tmp
      "C:\Users\Admin\AppData\Local\Temp\6C71.tmp" --splashC:\Users\Admin\AppData\Local\Temp\ad7f288c6c3528a5b8508f7bca6c1050N.exe 970A60B4DA0D1BC59363E7E3B9287E333150F68F6643B64296AA4E597CE8B69CF5AB5C1F60BF15914F36BAFB6952D83FE0DEA2C397102DFC98F496EC8833FE36
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:2416
      • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
        "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\ad7f288c6c3528a5b8508f7bca6c1050N.docx" /o ""
        3⤵
        • Checks processor information in registry
        • Enumerates system info in registry
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of SetWindowsHookEx
        PID:3024
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3804,i,3387628439405076340,17957358341235678872,262144 --variations-seed-version --mojo-platform-channel-handle=4220 /prefetch:8
    1⤵
      PID:432

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\6C71.tmp

      Filesize

      2.0MB

      MD5

      2d93786a92156c54b2aed0d743321416

      SHA1

      cc9fad2f96d551034fbc04ff450068ba9954ca22

      SHA256

      fceac5fdee10e44c4fbbfa8d66f3febcff9ff565fec9b6ad4e1e0900145570c3

      SHA512

      ae02359c772798a52384ccf2b2a509b8105e9c300e391040b4a37f932ed71e72f1f09d865d85c2021851d19db24efd8eca79998943e3077799cb2c4fc7887d39

    • C:\Users\Admin\AppData\Local\Temp\ad7f288c6c3528a5b8508f7bca6c1050N.docx

      Filesize

      19KB

      MD5

      4046ff080673cffac6529512b8d3bdbb

      SHA1

      d3cbc39065b7a55e995fa25397da2140bdac80c1

      SHA256

      f0c1b360c0b24b5450a79138650e6ee254afae6ce8f6c68da7d1f32f91582680

      SHA512

      453f70730b7560e3d3e23ddfa0fe74e014753f8b34b45254c1c0cf5fec0546a2b8b109a4f9d096e91711b6d02cb383a7136c2cb7bd6600d0598acf7c90c25418

    • memory/1972-0-0x0000000000400000-0x0000000000606000-memory.dmp

      Filesize

      2.0MB

    • memory/2416-5-0x0000000000400000-0x0000000000606000-memory.dmp

      Filesize

      2.0MB

    • memory/3024-19-0x00007FFE490F0000-0x00007FFE49100000-memory.dmp

      Filesize

      64KB

    • memory/3024-22-0x00007FFE89070000-0x00007FFE89265000-memory.dmp

      Filesize

      2.0MB

    • memory/3024-11-0x00007FFE490F0000-0x00007FFE49100000-memory.dmp

      Filesize

      64KB

    • memory/3024-15-0x00007FFE89070000-0x00007FFE89265000-memory.dmp

      Filesize

      2.0MB

    • memory/3024-16-0x00007FFE89070000-0x00007FFE89265000-memory.dmp

      Filesize

      2.0MB

    • memory/3024-18-0x00007FFE89070000-0x00007FFE89265000-memory.dmp

      Filesize

      2.0MB

    • memory/3024-13-0x00007FFE490F0000-0x00007FFE49100000-memory.dmp

      Filesize

      64KB

    • memory/3024-21-0x00007FFE89070000-0x00007FFE89265000-memory.dmp

      Filesize

      2.0MB

    • memory/3024-23-0x00007FFE89070000-0x00007FFE89265000-memory.dmp

      Filesize

      2.0MB

    • memory/3024-12-0x00007FFE490F0000-0x00007FFE49100000-memory.dmp

      Filesize

      64KB

    • memory/3024-24-0x00007FFE89070000-0x00007FFE89265000-memory.dmp

      Filesize

      2.0MB

    • memory/3024-20-0x00007FFE89070000-0x00007FFE89265000-memory.dmp

      Filesize

      2.0MB

    • memory/3024-17-0x00007FFE490F0000-0x00007FFE49100000-memory.dmp

      Filesize

      64KB

    • memory/3024-14-0x00007FFE8910D000-0x00007FFE8910E000-memory.dmp

      Filesize

      4KB

    • memory/3024-25-0x00007FFE46790000-0x00007FFE467A0000-memory.dmp

      Filesize

      64KB

    • memory/3024-26-0x00007FFE46790000-0x00007FFE467A0000-memory.dmp

      Filesize

      64KB

    • memory/3024-36-0x00007FFE89070000-0x00007FFE89265000-memory.dmp

      Filesize

      2.0MB