Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    110s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/08/2024, 03:13

General

  • Target

    d5a15ee6caf431c2d70b895d92ba7d8b5631e096377ccd5b3efb0706350a193e.exe

  • Size

    234KB

  • MD5

    183046f592877106cc353e1b9ee1d354

  • SHA1

    bdb0f3001c1cbd686a4fe25d55d77a76703a03c1

  • SHA256

    d5a15ee6caf431c2d70b895d92ba7d8b5631e096377ccd5b3efb0706350a193e

  • SHA512

    6d8e410f1016fb8319a6046b38dd6eef66944cdb1a05a23b11ed131d3829e89172032c0e3045bc21097d0bf7119bbcabad6e65dbb4181ff64229002491ed79e7

  • SSDEEP

    1536:DPQc0IiI+7vAIIzuQ8Tr15WUkTdIOzq0ZDFtnJvx/lJRaCAd1uhNR:rQc01zAf6QGkBIO20ZRfvH

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 12 IoCs
  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies data under HKEY_USERS 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d5a15ee6caf431c2d70b895d92ba7d8b5631e096377ccd5b3efb0706350a193e.exe
    "C:\Users\Admin\AppData\Local\Temp\d5a15ee6caf431c2d70b895d92ba7d8b5631e096377ccd5b3efb0706350a193e.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1544
    • C:\Users\Admin\AppData\Local\Temp\d5a15ee6caf431c2d70b895d92ba7d8b5631e096377ccd5b3efb0706350a193e.exe
      "C:\Users\Admin\AppData\Local\Temp\d5a15ee6caf431c2d70b895d92ba7d8b5631e096377ccd5b3efb0706350a193e.exe" rg
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Adds Run key to start application
      PID:2876
    • C:\windows\vspconsole.exe
      "C:\windows\vspconsole.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:4072
      • C:\windows\vspconsole.exe
        "C:\windows\vspconsole.exe" rg
        3⤵
        • Modifies visiblity of hidden/system files in Explorer
        • Executes dropped EXE
        • Adds Run key to start application
        PID:3852
      • C:\programdata\wmcsp.exe
        "C:\programdata\wmcsp.exe" wm 4072
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5092
  • C:\windows\vspconsole.exe
    "C:\windows\vspconsole.exe"
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of WriteProcessMemory
    PID:4080
    • C:\windows\vspconsole.exe
      "C:\windows\vspconsole.exe" rg
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in System32 directory
      • Modifies data under HKEY_USERS
      PID:4476
    • C:\windows\svcvsp.exe
      "C:\windows\svcvsp.exe" ws 4080 winvsp
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4912

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Package Cache\{4d8dcf8c-a72a-43e1-9833-c12724db736e}\RCXCED6.tmp

    Filesize

    234KB

    MD5

    d85a75a6a123cb313bd4bf013c80447b

    SHA1

    cc2615c51fc16c6da94692d430d6a45809f164d1

    SHA256

    57dc79eb271bb7d23e90dd914f29c15565a879033741713d580faedef04de31f

    SHA512

    9b90fad8d3a7d38145b4b0fe0596a776807b58e76da3b938b61ab8ca3b64f086895feebbf66c5c88b41cae135a380efbc879b33ab582ffb3dc76c762f62dd2ca

  • C:\RCX99CA.tmp

    Filesize

    233KB

    MD5

    555d14422aee35a3f64e534fef428d45

    SHA1

    077d797ae8f8147e5c705874f70d2285a72af978

    SHA256

    0b717be1c3ec6581db450cf6a592c685aaaf3844d8b9ccad94fe5da466d8290b

    SHA512

    4fc557dde59d4ce507bef8902e8b706724f1b1ef3bd04633430798da26039b5fdea2fdbde0c7100a0ed2195603d135b503203fa26bfc183c1c40b8a97a3cad15

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0\UsageLogs\d5a15ee6caf431c2d70b895d92ba7d8b5631e096377ccd5b3efb0706350a193e.exe.log

    Filesize

    115B

    MD5

    5f2253957958934a8b81921678832b72

    SHA1

    d9b030f94a9f3323fdcdb391192960d840b89723

    SHA256

    ab70783e426113082348a647ea0de73875931662f82b9f2ea4f3a44e5fac1000

    SHA512

    28310f23b744a03f81707d7fb77a9f5fce621bcfc56108b9ff76bbdb4ebc6014380715fef68c8b3c486c9aa4bfc1e66928caa7294bea4d263a18ab8557a96460

  • C:\Windows\System32\RCX85A1.tmp

    Filesize

    233KB

    MD5

    244569fd6100ba4f1281eacd07b9c901

    SHA1

    4e11cf30ae7f785db0958bcaf0299e363fb4394f

    SHA256

    0999259a208c782ae96d692cc841dfd3c1697f2bc0603d0ea6ff8cc5d11c6fe5

    SHA512

    3ba46d83a0a0c302ad4e533f84738d3f07457c73f4eb224d1454f13c6aa5cbe25438233ac5652c2da8c171f51f6bcdab89f1721398e8dab28d20682fd03059db

  • C:\Windows\System32\RCX85B2.tmp

    Filesize

    234KB

    MD5

    c7493a0bc7fb4b47e46cd9bc7cf79741

    SHA1

    0077de692ab09914f5c3ea58278d3dc145f59f6f

    SHA256

    d48ad1de7882ee2b6c055c14a17a190f4d45371f67e970808ce421aa1b64262a

    SHA512

    7e3fbddf8cd0cf5d6615f7d5b71b033b8476224dfd02bc042e4b97f9743cf7a64c31dc96ac63b03b731a5fba5a820f6e1b7dc645d58ad07990ad665f0a159c1f

  • C:\Windows\System32\winvsp.exe

    Filesize

    234KB

    MD5

    183046f592877106cc353e1b9ee1d354

    SHA1

    bdb0f3001c1cbd686a4fe25d55d77a76703a03c1

    SHA256

    d5a15ee6caf431c2d70b895d92ba7d8b5631e096377ccd5b3efb0706350a193e

    SHA512

    6d8e410f1016fb8319a6046b38dd6eef66944cdb1a05a23b11ed131d3829e89172032c0e3045bc21097d0bf7119bbcabad6e65dbb4181ff64229002491ed79e7

  • \??\c:\windows\system32\svcvsp.exe

    Filesize

    128KB

    MD5

    6d496981f26243e4388b126b77efc22e

    SHA1

    0965df53c465d739f95799cee1cf57a27068e1b6

    SHA256

    1a181f66aaf01d7ed1a6da7e8cd0972c418156d6672c054eec0e2ad2aa50f2d2

    SHA512

    cd77187a8a93da849fe6074dae6a0570cb17552fe8f11b9f0097e052ae5d42a8f736c9f40f58d49113bc642b5eb6efcb9f47e00c491603d323203a1bfe9cca39

  • memory/1544-2-0x00007FF844630000-0x00007FF844FD1000-memory.dmp

    Filesize

    9.6MB

  • memory/1544-0-0x00007FF8448E5000-0x00007FF8448E6000-memory.dmp

    Filesize

    4KB

  • memory/1544-192-0x00007FF844630000-0x00007FF844FD1000-memory.dmp

    Filesize

    9.6MB

  • memory/1544-364-0x00007FF844630000-0x00007FF844FD1000-memory.dmp

    Filesize

    9.6MB

  • memory/1544-622-0x00007FF844630000-0x00007FF844FD1000-memory.dmp

    Filesize

    9.6MB

  • memory/1544-623-0x00007FF844630000-0x00007FF844FD1000-memory.dmp

    Filesize

    9.6MB

  • memory/1544-3-0x000000001B300000-0x000000001B320000-memory.dmp

    Filesize

    128KB

  • memory/1544-637-0x00007FF844630000-0x00007FF844FD1000-memory.dmp

    Filesize

    9.6MB

  • memory/1544-1-0x000000001B810000-0x000000001BCDE000-memory.dmp

    Filesize

    4.8MB

  • memory/2876-625-0x00007FF844630000-0x00007FF844FD1000-memory.dmp

    Filesize

    9.6MB

  • memory/2876-1886-0x00007FF844630000-0x00007FF844FD1000-memory.dmp

    Filesize

    9.6MB

  • memory/4072-639-0x00007FF844630000-0x00007FF844FD1000-memory.dmp

    Filesize

    9.6MB

  • memory/4072-642-0x000000001C340000-0x000000001C3DC000-memory.dmp

    Filesize

    624KB

  • memory/4072-640-0x00007FF844630000-0x00007FF844FD1000-memory.dmp

    Filesize

    9.6MB

  • memory/4072-641-0x00007FF844630000-0x00007FF844FD1000-memory.dmp

    Filesize

    9.6MB

  • memory/4072-638-0x0000000000A80000-0x0000000000A98000-memory.dmp

    Filesize

    96KB

  • memory/4072-1928-0x00007FF844630000-0x00007FF844FD1000-memory.dmp

    Filesize

    9.6MB

  • memory/4072-1969-0x00007FF844630000-0x00007FF844FD1000-memory.dmp

    Filesize

    9.6MB

  • memory/4080-1131-0x000000001C1E0000-0x000000001C242000-memory.dmp

    Filesize

    392KB

  • memory/4080-1132-0x000000001AF90000-0x000000001AF98000-memory.dmp

    Filesize

    32KB