Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/08/2024, 05:57
Static task
static1
Behavioral task
behavioral1
Sample
43fae6a60dffcc47045c6f132d41ec77db2134dc825c35d1bf3abeb7210226cd.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
43fae6a60dffcc47045c6f132d41ec77db2134dc825c35d1bf3abeb7210226cd.exe
Resource
win10v2004-20240802-en
General
-
Target
43fae6a60dffcc47045c6f132d41ec77db2134dc825c35d1bf3abeb7210226cd.exe
-
Size
5.0MB
-
MD5
6d7b8f5bfd03d8fdacebd97ea437b559
-
SHA1
d7b3a1bcd0b1cda98805165e726cc8716d86c1f4
-
SHA256
43fae6a60dffcc47045c6f132d41ec77db2134dc825c35d1bf3abeb7210226cd
-
SHA512
12b15265295f1e7fbb4a1e75a43ac2fa9e988526724032fd20d2053ab47832488759b0be8e562be391ddecc2eab4d3ec98279e825e6cfcc73b356093a6a53ca6
-
SSDEEP
98304:NcFiJETrDllPOOCrbAyNa0hdvV8Y288tjxGjQ/cshPyBe+Rr0NuTBpVY:jJSDbPOEodvO88tjxGjQEsae+5ntY
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation mshta.exe -
Loads dropped DLL 2 IoCs
pid Process 1872 regsvr32.exe 3848 regsvr32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\MiddleWareX.ocx cmd.exe File opened for modification C:\Windows\SysWOW64\MiddleWareX.ocx cmd.exe -
Access Token Manipulation: Create Process with Token 1 TTPs 1 IoCs
pid Process 3024 mshta.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 43fae6a60dffcc47045c6f132d41ec77db2134dc825c35d1bf3abeb7210226cd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{869C5BAF-BE33-4A20-8796-D9E0DB5B669C}\MiscStatus\1 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{869C5BAF-BE33-4A20-8796-D9E0DB5B669C}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1C1A40F6-7177-494A-BAFC-A3DE6A80E15A}\1.0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1C1A40F6-7177-494A-BAFC-A3DE6A80E15A}\1.0\HELPDIR\ regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIDDLEWAREX.MiddleWareXCtrl.1 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1C1A40F6-7177-494A-BAFC-A3DE6A80E15A}\1.0\0\win32\ = "C:\\Windows\\SysWow64\\MiddleWareX.ocx" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8DBBDB25-9761-4EA8-B14D-1A3300ACC113} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8DBBDB25-9761-4EA8-B14D-1A3300ACC113}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1C1A40F6-7177-494A-BAFC-A3DE6A80E15A}\1.0\FLAGS regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8DBBDB25-9761-4EA8-B14D-1A3300ACC113}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1C1A40F6-7177-494A-BAFC-A3DE6A80E15A}\1.0\FLAGS\ = "2" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{77A84000-D1CC-4307-8D74-E70581B4E0FE}\ = "_DMiddleWareX" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{869C5BAF-BE33-4A20-8796-D9E0DB5B669C}\MiscStatus regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{77A84000-D1CC-4307-8D74-E70581B4E0FE} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{77A84000-D1CC-4307-8D74-E70581B4E0FE}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{77A84000-D1CC-4307-8D74-E70581B4E0FE}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{77A84000-D1CC-4307-8D74-E70581B4E0FE}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{869C5BAF-BE33-4A20-8796-D9E0DB5B669C}\ = "MiddleWareX Control" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{869C5BAF-BE33-4A20-8796-D9E0DB5B669C}\ProgID\ = "MIDDLEWAREX.MiddleWareXCtrl.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{869C5BAF-BE33-4A20-8796-D9E0DB5B669C}\Control regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{77A84000-D1CC-4307-8D74-E70581B4E0FE}\ = "_DMiddleWareX" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8DBBDB25-9761-4EA8-B14D-1A3300ACC113}\TypeLib\ = "{1C1A40F6-7177-494A-BAFC-A3DE6A80E15A}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FCCF290D-08EB-43AC-9282-D668D9715E0C}\ = "MiddleWareX Property Page" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1C1A40F6-7177-494A-BAFC-A3DE6A80E15A} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8DBBDB25-9761-4EA8-B14D-1A3300ACC113}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8DBBDB25-9761-4EA8-B14D-1A3300ACC113}\TypeLib\ = "{1C1A40F6-7177-494A-BAFC-A3DE6A80E15A}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MIDDLEWAREX.MiddleWareXCtrl.1\ = "MiddleWareX Control" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{869C5BAF-BE33-4A20-8796-D9E0DB5B669C}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8DBBDB25-9761-4EA8-B14D-1A3300ACC113}\ = "_DMiddleWareXEvents" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FCCF290D-08EB-43AC-9282-D668D9715E0C}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{869C5BAF-BE33-4A20-8796-D9E0DB5B669C}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{869C5BAF-BE33-4A20-8796-D9E0DB5B669C}\TypeLib\ = "{1C1A40F6-7177-494A-BAFC-A3DE6A80E15A}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{77A84000-D1CC-4307-8D74-E70581B4E0FE}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIDDLEWAREX.MiddleWareXCtrl.1\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1C1A40F6-7177-494A-BAFC-A3DE6A80E15A}\1.0\0\win32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{77A84000-D1CC-4307-8D74-E70581B4E0FE}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8DBBDB25-9761-4EA8-B14D-1A3300ACC113}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8DBBDB25-9761-4EA8-B14D-1A3300ACC113}\ = "_DMiddleWareXEvents" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MIDDLEWAREX.MiddleWareXCtrl.1\CLSID\ = "{869C5BAF-BE33-4A20-8796-D9E0DB5B669C}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{869C5BAF-BE33-4A20-8796-D9E0DB5B669C}\ToolboxBitmap32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{869C5BAF-BE33-4A20-8796-D9E0DB5B669C}\Version\ = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{77A84000-D1CC-4307-8D74-E70581B4E0FE} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8DBBDB25-9761-4EA8-B14D-1A3300ACC113}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8DBBDB25-9761-4EA8-B14D-1A3300ACC113}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{869C5BAF-BE33-4A20-8796-D9E0DB5B669C} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{869C5BAF-BE33-4A20-8796-D9E0DB5B669C}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1C1A40F6-7177-494A-BAFC-A3DE6A80E15A}\1.0\0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{77A84000-D1CC-4307-8D74-E70581B4E0FE}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{77A84000-D1CC-4307-8D74-E70581B4E0FE}\TypeLib\ = "{1C1A40F6-7177-494A-BAFC-A3DE6A80E15A}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{869C5BAF-BE33-4A20-8796-D9E0DB5B669C}\MiscStatus\ = "0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{869C5BAF-BE33-4A20-8796-D9E0DB5B669C}\Version regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{77A84000-D1CC-4307-8D74-E70581B4E0FE}\TypeLib\ = "{1C1A40F6-7177-494A-BAFC-A3DE6A80E15A}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{77A84000-D1CC-4307-8D74-E70581B4E0FE}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FCCF290D-08EB-43AC-9282-D668D9715E0C}\InprocServer32\ = "C:\\Windows\\SysWow64\\MiddleWareX.ocx" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1C1A40F6-7177-494A-BAFC-A3DE6A80E15A}\1.0\ = "MiddleWareXLib" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8DBBDB25-9761-4EA8-B14D-1A3300ACC113}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8DBBDB25-9761-4EA8-B14D-1A3300ACC113}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{77A84000-D1CC-4307-8D74-E70581B4E0FE}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8DBBDB25-9761-4EA8-B14D-1A3300ACC113} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FCCF290D-08EB-43AC-9282-D668D9715E0C} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{869C5BAF-BE33-4A20-8796-D9E0DB5B669C}\InprocServer32\ = "C:\\Windows\\SysWow64\\MiddleWareX.ocx" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{869C5BAF-BE33-4A20-8796-D9E0DB5B669C}\ToolboxBitmap32\ = "C:\\Windows\\SysWow64\\MiddleWareX.ocx, 1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{869C5BAF-BE33-4A20-8796-D9E0DB5B669C}\MiscStatus\1\ = "131473" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{869C5BAF-BE33-4A20-8796-D9E0DB5B669C}\Control\ regsvr32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4752 43fae6a60dffcc47045c6f132d41ec77db2134dc825c35d1bf3abeb7210226cd.exe 4752 43fae6a60dffcc47045c6f132d41ec77db2134dc825c35d1bf3abeb7210226cd.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4752 wrote to memory of 4040 4752 43fae6a60dffcc47045c6f132d41ec77db2134dc825c35d1bf3abeb7210226cd.exe 89 PID 4752 wrote to memory of 4040 4752 43fae6a60dffcc47045c6f132d41ec77db2134dc825c35d1bf3abeb7210226cd.exe 89 PID 4752 wrote to memory of 4040 4752 43fae6a60dffcc47045c6f132d41ec77db2134dc825c35d1bf3abeb7210226cd.exe 89 PID 4040 wrote to memory of 3024 4040 cmd.exe 91 PID 4040 wrote to memory of 3024 4040 cmd.exe 91 PID 4040 wrote to memory of 3024 4040 cmd.exe 91 PID 3024 wrote to memory of 5080 3024 mshta.exe 93 PID 3024 wrote to memory of 5080 3024 mshta.exe 93 PID 3024 wrote to memory of 5080 3024 mshta.exe 93 PID 5080 wrote to memory of 1872 5080 cmd.exe 95 PID 5080 wrote to memory of 1872 5080 cmd.exe 95 PID 5080 wrote to memory of 1872 5080 cmd.exe 95 PID 5080 wrote to memory of 3848 5080 cmd.exe 96 PID 5080 wrote to memory of 3848 5080 cmd.exe 96 PID 5080 wrote to memory of 3848 5080 cmd.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\43fae6a60dffcc47045c6f132d41ec77db2134dc825c35d1bf3abeb7210226cd.exe"C:\Users\Admin\AppData\Local\Temp\43fae6a60dffcc47045c6f132d41ec77db2134dc825c35d1bf3abeb7210226cd.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\MiddleWareX.bat2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Windows\SysWOW64\mshta.exemshta vbscript:CreateObject("Shell.Application").ShellExecute("cmd.exe","/c C:\Users\Admin\AppData\Local\Temp\MIDDLE~1.BAT ::","","runas",1)(window.close)3⤵
- Checks computer location settings
- Access Token Manipulation: Create Process with Token
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\MIDDLE~1.BAT ::4⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /u /s C:\Windows\SysWOW64\MiddleWareX.ocx5⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1872
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s C:\Windows\SysWOW64\MiddleWareX.ocx5⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3848
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
289B
MD52c4b4ba717acec4f8629f295b202f49c
SHA193837ef6098e8de8cc50c20d2a5dada3f7a48892
SHA2568c1179c8249eb42966164221056570f651d1f24cea66122130cd933e43e24c7f
SHA512184ab3940e7240e30872fd3223d51c11871bdd874b8d8d6062baff9907e95f29cae322f8113f046f7e1fad54d9fef9b692c8854df2536804e06723d02abbf99d
-
Filesize
2.1MB
MD5dc4a6a41db0678422c5fbbb1068b1752
SHA1a6b80709cc11ebee962873a777a6ca08b85608cd
SHA25603965be1329c5f2e2983de87740c03d122df7088a31a50e3fbbbb970e29edd75
SHA512d7ca0a267d385bb647042004af3c88b13154d3ac7f2d77a33ba9d434ed035e59cb32a57fea248587a8f69e5c254e042301cf9b46121615f57fe10032bba7a1b3
-
Filesize
331B
MD5e97b1152cfd26992ba5d0682bc07e36e
SHA12e64f041553aa790ad5f176d4ffe6aa0952a6a51
SHA25609328bd4ff7a8676702402b24f7abdf6249abe354f944d6a154ef4b9f8311ae2
SHA512b27d96ccae1a67e72d9aa66870acd33b63a9b669bd3c44b52021c28e1c7d8fd334d05c888aaed2cd161795036c3d2ff0f2f0378dc656f0748c9351b63f4dfd25