Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    103s
  • max time network
    105s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/08/2024, 06:29

General

  • Target

    964d0cf040d3627b1fb810ae4c9c4a40N.exe

  • Size

    3.0MB

  • MD5

    964d0cf040d3627b1fb810ae4c9c4a40

  • SHA1

    f2d1211d17a38550d9278f281f6d39b37ff8a682

  • SHA256

    40e15b4fa176fe80b124a013d2f6f30769266adebccb0c0ff4965d2eba3d25c3

  • SHA512

    d889d8e94a9e3aafbdc6f6cbba54ee64eb744b3d40f4adbc690a6f5abdb750c7840e0e0c73111e000484b5ee8bb917ab7e4cca4b2a46e7804d00725797bdafa7

  • SSDEEP

    49152:qiH2AaajKHX/Ft0vR+Y1pxsVnmMAnBxbu2ONWWIL2wM8+AtZiti8:HHRawKHPFyvR+2VMETbu2vrSwM8zg

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\964d0cf040d3627b1fb810ae4c9c4a40N.exe
    "C:\Users\Admin\AppData\Local\Temp\964d0cf040d3627b1fb810ae4c9c4a40N.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Modifies system certificate store
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2424
    • C:\Users\Admin\AppData\Local\Temp\OO Software\OO LiveUpdate\Unknown 1724135410\OOLiveUpdateWorker.exe
      "C:\Users\Admin\AppData\Local\Temp\OO Software\OO LiveUpdate\Unknown 1724135410\OOLiveUpdateWorker.exe" -ProgramName "Unknown" -InstalledLocation "C:\Users\Admin\AppData\Local\Temp\\" -WindowRec "367 176"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1480
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1740

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07A88C01EC98D34B4BDC2AA2BF874C1D

    Filesize

    471B

    MD5

    ccb5dddfea906317fad2672bc36a377a

    SHA1

    c7f85bd450c2b518107bc5cbf29a9b6d408bcb45

    SHA256

    7bce2c110b58e0d2d5ce0fe080ef5afdf068de99da6db8efb6a3f6a04ff9e16c

    SHA512

    1cc19d043215737a5c8b849e221db23f4539d3f16d84843d33b59315b638afa5bac89a2887cb1d9f8a697590808271382effd512ef688d73bf8493c57ecb91ec

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

    Filesize

    2KB

    MD5

    58fd856ece8c070d5df6faffe2273c60

    SHA1

    8cc3b05cf38684288a27bf273d94449fd15cab5d

    SHA256

    1efeaf11f4fdaef3a7a15835e2ec5e70330057ade2a4334692630ffdc952555e

    SHA512

    7ef07526ac45e0f7ed24db22db44614f102b88e9642952a9ec2e0bc550e73fe3fccec9754a8a426d1a573d8d9c3d0ae798949a6bfeb204302267870b563d2d17

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

    Filesize

    1KB

    MD5

    3a0e611157f1066d08c3e5b273aba714

    SHA1

    0163f166be0b036cfc2b6ce78d59ede05552de17

    SHA256

    20a8d02cfcfd8887394536448dc97c88d49a247a4a933ba7081faec72da8fa8e

    SHA512

    55a387ef662a407ececcba0fca3d0a48e3e9f36eee906684dc78053396915fb5ebe78ea2d1e7ce313001cf9d7b1ea41cda419dc554957d1a4ec80d0fa7e82f00

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07A88C01EC98D34B4BDC2AA2BF874C1D

    Filesize

    480B

    MD5

    871aacbf3714807abf428d2582300e39

    SHA1

    6dcbf0c307c3e93dd3d744d16e2ae0747a07dd05

    SHA256

    9ac2ad94209761d3726a732243e7b651d1b34d21518584c9dc27b5bd63c14ad4

    SHA512

    66020048bc9288c2d7e9f4d603afd17558cb182a2e2cd77a51c8b3d96d7d73d0f0280dda59dff448f1b3954679a8b5ff5ff5cb17822b52a7afbb32c151e02fcd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

    Filesize

    488B

    MD5

    615c989499f37dca87a2590579910dfa

    SHA1

    6b36d8eaddb6c823c84525f05e668d4bbde8a052

    SHA256

    2bdea2a55e7ec6356783d046dbdf9c81bdd34da9c5ff00c6956984c9f69cf3cd

    SHA512

    e6ec18bac90e1c332cda9a41fdef1125e56eefb3898998488bb4e6d87f878d6e5e7680ad05494ecbb8186a766649d104668931874ca190e6e10a2323548302ba

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

    Filesize

    482B

    MD5

    19b963dfff2b3fefcd30af092b496904

    SHA1

    2e7a6d5619fb2f127d8fb7f738fd324f012706cf

    SHA256

    cace7e2eed156493e4be177b94d4c6c260a543b282cc070af9aae82a51dbfd21

    SHA512

    2ea1b947f54b1a57f7f78e06ef0b24c392374010928a30c24278ef3f43488ead189515fd5d844fafac792715396c9728e83f0c97e67021bad3d046e9ab6fff5b

  • C:\Users\Admin\AppData\Local\Temp\OO Software\OO LiveUpdate\Unknown 1724135410\OOLiveUpdateWorker.exe

    Filesize

    3.4MB

    MD5

    a60244c64ce6080a7965d780970e37bd

    SHA1

    e0502440acf407d2a89b440f91d4127be0d7566b

    SHA256

    70a1ccbc632b12e89810717a7b884a964a3a24c14fc43a618564a2f1b17ec0de

    SHA512

    57fd2339b4719e3f45bb114a8e2b10146df6757f4e87b18a2776815c944e5babc594c3ee575bf10dee5dc0b6840534c050c54c4b570dbb6c9369bf2198815086