Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/08/2024, 20:43
Static task
static1
Behavioral task
behavioral1
Sample
3c3a3a76ae18e466fbaea4b19cbf71f37b2afff517c575e845144b4de8e9fc8b.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3c3a3a76ae18e466fbaea4b19cbf71f37b2afff517c575e845144b4de8e9fc8b.exe
Resource
win10v2004-20240802-en
General
-
Target
3c3a3a76ae18e466fbaea4b19cbf71f37b2afff517c575e845144b4de8e9fc8b.exe
-
Size
598KB
-
MD5
0c49a29f693f2d36021de6d599ee0871
-
SHA1
027d2387d703aa1b0e636b0061301ba87c29af32
-
SHA256
3c3a3a76ae18e466fbaea4b19cbf71f37b2afff517c575e845144b4de8e9fc8b
-
SHA512
79dc77932d4b944b30e78b540128b05f9153d84034138ae6a9b50b82322f283b9e5339b47535c2b9bec9d1fb4e639c09833c5b53e53c3e7fac12b572d10fc5d8
-
SSDEEP
12288:tsAGDraaOptNwpeDKtM4zZKbUMiILLfBaYHCd9xNhYRL:tsAOPOagWsiIhaYijFYRL
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation 3c3a3a76ae18e466fbaea4b19cbf71f37b2afff517c575e845144b4de8e9fc8b.exe -
Executes dropped EXE 2 IoCs
pid Process 3988 eidolon.exe 3232 3c3a3a76ae18e466fbaea4b19cbf71f37b2afff517c575e845144b4de8e9fc8b.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\shell32.dll eidolon.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\gAppVShNotify.exe 3c3a3a76ae18e466fbaea4b19cbf71f37b2afff517c575e845144b4de8e9fc8b.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\gAppVShNotify.ico 3c3a3a76ae18e466fbaea4b19cbf71f37b2afff517c575e845144b4de8e9fc8b.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft Analysis Services\AS OLEDB\140\SQLDumper.exe 3c3a3a76ae18e466fbaea4b19cbf71f37b2afff517c575e845144b4de8e9fc8b.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\it-IT\InputPersonalization.exe.mui 3c3a3a76ae18e466fbaea4b19cbf71f37b2afff517c575e845144b4de8e9fc8b.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\OfflineScannerShell.exe.mui 3c3a3a76ae18e466fbaea4b19cbf71f37b2afff517c575e845144b4de8e9fc8b.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe 3c3a3a76ae18e466fbaea4b19cbf71f37b2afff517c575e845144b4de8e9fc8b.exe File opened for modification C:\Program Files\Internet Explorer\fr-FR\ieinstal.exe.mui 3c3a3a76ae18e466fbaea4b19cbf71f37b2afff517c575e845144b4de8e9fc8b.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe 3c3a3a76ae18e466fbaea4b19cbf71f37b2afff517c575e845144b4de8e9fc8b.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\es-ES\ShapeCollector.exe.mui 3c3a3a76ae18e466fbaea4b19cbf71f37b2afff517c575e845144b4de8e9fc8b.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\chrmstp.exe 3c3a3a76ae18e466fbaea4b19cbf71f37b2afff517c575e845144b4de8e9fc8b.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jinfo.exe 3c3a3a76ae18e466fbaea4b19cbf71f37b2afff517c575e845144b4de8e9fc8b.exe File opened for modification C:\Program Files\Windows Mail\wab.exe 3c3a3a76ae18e466fbaea4b19cbf71f37b2afff517c575e845144b4de8e9fc8b.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ShapeCollector.exe 3c3a3a76ae18e466fbaea4b19cbf71f37b2afff517c575e845144b4de8e9fc8b.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\en-US\ShapeCollector.exe.mui 3c3a3a76ae18e466fbaea4b19cbf71f37b2afff517c575e845144b4de8e9fc8b.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fr-FR\ShapeCollector.exe.mui 3c3a3a76ae18e466fbaea4b19cbf71f37b2afff517c575e845144b4de8e9fc8b.exe File created C:\Program Files\Common Files\microsoft shared\OFFICE16\gLICLUA.ico 3c3a3a76ae18e466fbaea4b19cbf71f37b2afff517c575e845144b4de8e9fc8b.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\gcreatedump.exe 3c3a3a76ae18e466fbaea4b19cbf71f37b2afff517c575e845144b4de8e9fc8b.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\notification_helper.exe 3c3a3a76ae18e466fbaea4b19cbf71f37b2afff517c575e845144b4de8e9fc8b.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\gjavadoc.exe 3c3a3a76ae18e466fbaea4b19cbf71f37b2afff517c575e845144b4de8e9fc8b.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe 3c3a3a76ae18e466fbaea4b19cbf71f37b2afff517c575e845144b4de8e9fc8b.exe File created C:\Program Files\Google\Chrome\Application\chrome.exe 3c3a3a76ae18e466fbaea4b19cbf71f37b2afff517c575e845144b4de8e9fc8b.exe File opened for modification C:\Program Files\Internet Explorer\ielowutil.exe 3c3a3a76ae18e466fbaea4b19cbf71f37b2afff517c575e845144b4de8e9fc8b.exe File created C:\Program Files\Java\jdk-1.8\bin\javaws.exe 3c3a3a76ae18e466fbaea4b19cbf71f37b2afff517c575e845144b4de8e9fc8b.exe File created C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-006E-0409-1000-0000000FF1CE}\gmisc.ico 3c3a3a76ae18e466fbaea4b19cbf71f37b2afff517c575e845144b4de8e9fc8b.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\uk-UA\ShapeCollector.exe.mui 3c3a3a76ae18e466fbaea4b19cbf71f37b2afff517c575e845144b4de8e9fc8b.exe File created C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE 3c3a3a76ae18e466fbaea4b19cbf71f37b2afff517c575e845144b4de8e9fc8b.exe File created C:\Program Files\dotnet\gdotnet.ico 3c3a3a76ae18e466fbaea4b19cbf71f37b2afff517c575e845144b4de8e9fc8b.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\gelevation_service.ico 3c3a3a76ae18e466fbaea4b19cbf71f37b2afff517c575e845144b4de8e9fc8b.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javaws.exe 3c3a3a76ae18e466fbaea4b19cbf71f37b2afff517c575e845144b4de8e9fc8b.exe File created C:\Program Files\Java\jdk-1.8\bin\javadoc.exe 3c3a3a76ae18e466fbaea4b19cbf71f37b2afff517c575e845144b4de8e9fc8b.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\mip.exe 3c3a3a76ae18e466fbaea4b19cbf71f37b2afff517c575e845144b4de8e9fc8b.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\it-IT\msinfo32.exe.mui 3c3a3a76ae18e466fbaea4b19cbf71f37b2afff517c575e845144b4de8e9fc8b.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\gchrome.exe.sig 3c3a3a76ae18e466fbaea4b19cbf71f37b2afff517c575e845144b4de8e9fc8b.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\gchrome.exe.ico 3c3a3a76ae18e466fbaea4b19cbf71f37b2afff517c575e845144b4de8e9fc8b.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\RCX89C9.tmp 3c3a3a76ae18e466fbaea4b19cbf71f37b2afff517c575e845144b4de8e9fc8b.exe File opened for modification C:\Program Files\Internet Explorer\ieinstal.exe 3c3a3a76ae18e466fbaea4b19cbf71f37b2afff517c575e845144b4de8e9fc8b.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\appletviewer.exe 3c3a3a76ae18e466fbaea4b19cbf71f37b2afff517c575e845144b4de8e9fc8b.exe File created C:\Program Files\Java\jdk-1.8\bin\javah.exe 3c3a3a76ae18e466fbaea4b19cbf71f37b2afff517c575e845144b4de8e9fc8b.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\gjavaws.exe 3c3a3a76ae18e466fbaea4b19cbf71f37b2afff517c575e845144b4de8e9fc8b.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\RCX8B48.tmp 3c3a3a76ae18e466fbaea4b19cbf71f37b2afff517c575e845144b4de8e9fc8b.exe File created C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-001F-0409-1000-0000000FF1CE}\gmisc.ico 3c3a3a76ae18e466fbaea4b19cbf71f37b2afff517c575e845144b4de8e9fc8b.exe File created C:\Program Files\7-Zip\g7zFM.ico 3c3a3a76ae18e466fbaea4b19cbf71f37b2afff517c575e845144b4de8e9fc8b.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe 3c3a3a76ae18e466fbaea4b19cbf71f37b2afff517c575e845144b4de8e9fc8b.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\RCX8938.tmp 3c3a3a76ae18e466fbaea4b19cbf71f37b2afff517c575e845144b4de8e9fc8b.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe 3c3a3a76ae18e466fbaea4b19cbf71f37b2afff517c575e845144b4de8e9fc8b.exe File opened for modification C:\Program Files\Mozilla Firefox\gcrashreporter.exe 3c3a3a76ae18e466fbaea4b19cbf71f37b2afff517c575e845144b4de8e9fc8b.exe File created C:\Program Files\Mozilla Firefox\gcrashreporter.ico 3c3a3a76ae18e466fbaea4b19cbf71f37b2afff517c575e845144b4de8e9fc8b.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\createdump.exe 3c3a3a76ae18e466fbaea4b19cbf71f37b2afff517c575e845144b4de8e9fc8b.exe File opened for modification C:\Program Files\Google\Chrome\Application\RCX89A9.tmp 3c3a3a76ae18e466fbaea4b19cbf71f37b2afff517c575e845144b4de8e9fc8b.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\gchrmstp.exe 3c3a3a76ae18e466fbaea4b19cbf71f37b2afff517c575e845144b4de8e9fc8b.exe File created C:\Program Files\Java\jdk-1.8\bin\jar.exe 3c3a3a76ae18e466fbaea4b19cbf71f37b2afff517c575e845144b4de8e9fc8b.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\gjinfo.exe 3c3a3a76ae18e466fbaea4b19cbf71f37b2afff517c575e845144b4de8e9fc8b.exe File created C:\Program Files\Java\jdk-1.8\bin\gjinfo.ico 3c3a3a76ae18e466fbaea4b19cbf71f37b2afff517c575e845144b4de8e9fc8b.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Analysis Services\AS OLEDB\140\SQLDumper.exe 3c3a3a76ae18e466fbaea4b19cbf71f37b2afff517c575e845144b4de8e9fc8b.exe File created C:\Program Files\7-Zip\7zFM.exe 3c3a3a76ae18e466fbaea4b19cbf71f37b2afff517c575e845144b4de8e9fc8b.exe File created C:\Program Files\Common Files\microsoft shared\OFFICE16\LICLUA.EXE 3c3a3a76ae18e466fbaea4b19cbf71f37b2afff517c575e845144b4de8e9fc8b.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\RCX8969.tmp 3c3a3a76ae18e466fbaea4b19cbf71f37b2afff517c575e845144b4de8e9fc8b.exe File created C:\Program Files\Java\jdk-1.8\bin\gjavapackager.ico 3c3a3a76ae18e466fbaea4b19cbf71f37b2afff517c575e845144b4de8e9fc8b.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe 3c3a3a76ae18e466fbaea4b19cbf71f37b2afff517c575e845144b4de8e9fc8b.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\RCX8958.tmp 3c3a3a76ae18e466fbaea4b19cbf71f37b2afff517c575e845144b4de8e9fc8b.exe File created C:\Program Files\Java\jdk-1.8\bin\jhat.exe 3c3a3a76ae18e466fbaea4b19cbf71f37b2afff517c575e845144b4de8e9fc8b.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\gjabswitch.exe 3c3a3a76ae18e466fbaea4b19cbf71f37b2afff517c575e845144b4de8e9fc8b.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\TabTip.exe 3c3a3a76ae18e466fbaea4b19cbf71f37b2afff517c575e845144b4de8e9fc8b.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\gidlj.exe 3c3a3a76ae18e466fbaea4b19cbf71f37b2afff517c575e845144b4de8e9fc8b.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\bfsvc.exe 3c3a3a76ae18e466fbaea4b19cbf71f37b2afff517c575e845144b4de8e9fc8b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3c3a3a76ae18e466fbaea4b19cbf71f37b2afff517c575e845144b4de8e9fc8b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3c3a3a76ae18e466fbaea4b19cbf71f37b2afff517c575e845144b4de8e9fc8b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eidolon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3972 wrote to memory of 3988 3972 3c3a3a76ae18e466fbaea4b19cbf71f37b2afff517c575e845144b4de8e9fc8b.exe 84 PID 3972 wrote to memory of 3988 3972 3c3a3a76ae18e466fbaea4b19cbf71f37b2afff517c575e845144b4de8e9fc8b.exe 84 PID 3972 wrote to memory of 3988 3972 3c3a3a76ae18e466fbaea4b19cbf71f37b2afff517c575e845144b4de8e9fc8b.exe 84 PID 3972 wrote to memory of 3500 3972 3c3a3a76ae18e466fbaea4b19cbf71f37b2afff517c575e845144b4de8e9fc8b.exe 85 PID 3972 wrote to memory of 3500 3972 3c3a3a76ae18e466fbaea4b19cbf71f37b2afff517c575e845144b4de8e9fc8b.exe 85 PID 3972 wrote to memory of 3500 3972 3c3a3a76ae18e466fbaea4b19cbf71f37b2afff517c575e845144b4de8e9fc8b.exe 85 PID 3972 wrote to memory of 4024 3972 3c3a3a76ae18e466fbaea4b19cbf71f37b2afff517c575e845144b4de8e9fc8b.exe 86 PID 3972 wrote to memory of 4024 3972 3c3a3a76ae18e466fbaea4b19cbf71f37b2afff517c575e845144b4de8e9fc8b.exe 86 PID 3972 wrote to memory of 4024 3972 3c3a3a76ae18e466fbaea4b19cbf71f37b2afff517c575e845144b4de8e9fc8b.exe 86 PID 4024 wrote to memory of 3232 4024 cmd.exe 89 PID 4024 wrote to memory of 3232 4024 cmd.exe 89 PID 4024 wrote to memory of 3232 4024 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c3a3a76ae18e466fbaea4b19cbf71f37b2afff517c575e845144b4de8e9fc8b.exe"C:\Users\Admin\AppData\Local\Temp\3c3a3a76ae18e466fbaea4b19cbf71f37b2afff517c575e845144b4de8e9fc8b.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Users\Admin\AppData\Local\Temp\eidolon.exe"C:\Users\Admin\AppData\Local\Temp\eidolon.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3988
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Windows\temp\tttdelzzz.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:3500
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Windows\temp\tttbrozzz.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Users\Admin\AppData\Local\Temp\3c3a3a76ae18e466fbaea4b19cbf71f37b2afff517c575e845144b4de8e9fc8b.exe"C:\Users\Admin\AppData\Local\Temp\3c3a3a76ae18e466fbaea4b19cbf71f37b2afff517c575e845144b4de8e9fc8b.exe"3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3232
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD538b41d03e9dfcbbd08210c5f0b50ba71
SHA12fbfde75ce9fe8423d8e7720bf7408cedcb57a70
SHA256611f2cb2e03bd8dbcb584cd0a1c48accfba072dd3fc4e6d3144e2062553637f5
SHA512ec97556b6ff6023d9e6302ba586ef27b1b54fbf7e8ac04ff318aa4694f13ad343049210ef17b7b603963984c1340589665d67d9c65fec0f91053ff43b1401ba9
-
Filesize
4KB
MD53ea9bcbc01e1a652de5a6fc291a66d1a
SHA1aee490d53ee201879dff37503a0796c77642a792
SHA256a058bfd185fe714927e15642004866449bce425d34292a08af56d66cf03ebe6c
SHA5127c740132f026341770b6a20575786da581d8a31850d0d680978a00cc4dfca1e848ef9cdc32e51bae680ea13f6cc0d7324c38765cb4e26dcb2e423aced7da0501
-
C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-001F-0C0A-1000-0000000FF1CE}\gmisc.ico
Filesize4KB
MD5fc27f73816c9f640d800cdc1c9294751
SHA1e6c3d8835d1de4e9606e5588e741cd1be27398f6
SHA2563cc5043caa157e5f9b1870527b8c323850bdae1e58d6760e4e895d2ab8a35a05
SHA5129e36b96acc97bc7cd45e67a47f1ae7ab7d3818cc2fdaad147524ce9e4baedfaac9cd012923ec65db763bfd850c65b497376bb0694508bee59747f97bf1591fd4
-
Filesize
24KB
MD5f3858fb30c8ddb74a11e85381009c438
SHA1ab388dbb45109acd543d28030daf065e50e20a1b
SHA256a1bf9bc23f97fee5a83ddcb3ba4d8fbbcc70fb2d871b325261be0ded72196fe9
SHA5126aeb783c6ed7108480f956fd5b54a39a26d6257dc1c472d4d16700eb76be4276690596702fbc9a078662627673965584accf90449cd08dec461806ae3d57c0d1
-
Filesize
521KB
MD598b815d1fc34b5db8722032a8efeb6e9
SHA1aad051e11f615b1e51a92f9618b5587946909e61
SHA256fbbd996282f95538dffb085d8f6f4d235bc4a14e01ee6c27a7eb4a486f347fab
SHA51223872938c736ace350e3afa94c72da66837a7d6f0995f64c21ba40f6f519028253272644abd24a75d5a424cde303e76a5c4eaff56e605c34cd62d591cd912a53
-
Filesize
619B
MD5bb966afbd3d59b12859ebf0d5b32decf
SHA11605e21f105413e621ddb38f51abb0f677fb75e5
SHA256128dfecf92925ea7edd6cc9964cd50a94de32a96f403a527e060314d14484b04
SHA51224f4396334b90c62e15e368bfc3f24bbe55b784cafe05619f545b2af6d27ee36733f69cf9c7684a2046d26d1b9a43253e4ada2851b91b449e941822c97873a5a
-
Filesize
327B
MD535589632e70797b81a008dba6de0c39a
SHA153d5278e2171165a23333c796dd21311e04e4392
SHA25618e09639324cd82e1efdd1fd4900f32b6d333aa8ca7a55e7fb5060f60f48f7e2
SHA512a46b63cff11e3df22badfd11e4c4d4035116da95a7595e77ac13193886362f95ff67eb6e3ba5fcfa3600862418e128dff6561cb446366ca8b19484a42e45a411