Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    109s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/08/2024, 09:54

General

  • Target

    22289a61cd8a347a03da845d34820534b3e617781447a91c6a0fb3b1e6f6a184.exe

  • Size

    2.9MB

  • MD5

    b3fc214094fbc7d1542542fd86d23963

  • SHA1

    50f97ed0a4719a75ef7bd31c38a829ec0d155e92

  • SHA256

    22289a61cd8a347a03da845d34820534b3e617781447a91c6a0fb3b1e6f6a184

  • SHA512

    070ba8b6a5f6a89915f4516434b23e77b60e5a1ba87f251754ecbbd3b2616ec5de3a3939ab480ab471fb42ce82c11bdb1b51b3f6391e9ce0328c40a7b88593b1

  • SSDEEP

    49152:SGCL+RB7rH7cRsZPAEXl6PxJt3rMYS3Usa5Lcq/CqjJxQA5VMvPV3/SdLS:TCU3H7lZoEXl+ft7MYSoLN/CCxQA5VsV

Malware Config

Signatures

  • Disables service(s) 3 TTPs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 1 IoCs
  • Stops running service(s) 4 TTPs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 4 IoCs
  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 7 IoCs
  • Launches sc.exe 6 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 20 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Runs net.exe
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\22289a61cd8a347a03da845d34820534b3e617781447a91c6a0fb3b1e6f6a184.exe
    "C:\Users\Admin\AppData\Local\Temp\22289a61cd8a347a03da845d34820534b3e617781447a91c6a0fb3b1e6f6a184.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3976
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c attrib -s -h -r -a %SystemRoot%\Fonts
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1980
      • C:\Windows\SysWOW64\attrib.exe
        attrib -s -h -r -a C:\Windows\Fonts
        3⤵
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Views/modifies file attributes
        PID:4660
    • C:\Windows\SysWOW64\net.exe
      net stop MicrosotMaims
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3564
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop MicrosotMaims
        3⤵
        • System Location Discovery: System Language Discovery
        PID:540
    • C:\Windows\SysWOW64\sc.exe
      sc delete MicrosotMaims
      2⤵
      • Launches sc.exe
      • System Location Discovery: System Language Discovery
      PID:1776
    • C:\Windows\SysWOW64\net.exe
      net stop MicrosotMais
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2156
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop MicrosotMais
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2380
    • C:\Windows\SysWOW64\sc.exe
      sc delete MicrosotMais
      2⤵
      • Launches sc.exe
      • System Location Discovery: System Language Discovery
      PID:3572
    • C:\Windows\SysWOW64\net.exe
      net stop lanmanserver /y
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1100
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop lanmanserver /y
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3192
    • C:\Windows\SysWOW64\sc.exe
      sc config lanmanserver start= DISABLED 2>nul
      2⤵
      • Launches sc.exe
      • System Location Discovery: System Language Discovery
      PID:3452
    • C:\Windows\SysWOW64\sc.exe
      sc delete lanmanserver
      2⤵
      • Launches sc.exe
      • System Location Discovery: System Language Discovery
      PID:3432
    • C:\Windows\SysWOW64\net.exe
      net stop mssecsvc2.0
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3924
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop mssecsvc2.0
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2104
    • C:\Windows\SysWOW64\sc.exe
      sc delete mssecsvc2.0
      2⤵
      • Launches sc.exe
      • System Location Discovery: System Language Discovery
      PID:4980
    • C:\Windows\SysWOW64\net.exe
      net stop mssecsvc2.1
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4572
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop mssecsvc2.1
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4772
    • C:\Windows\SysWOW64\sc.exe
      sc delete mssecsvc2.1
      2⤵
      • Launches sc.exe
      • System Location Discovery: System Language Discovery
      PID:3300
    • \??\c:\windows\Fonts\svchost.exe
      c:\windows\Fonts\svchost.exe install MicrosotMaims c:\windows\Fonts\conhost.exe
      2⤵
      • Executes dropped EXE
      PID:3724
    • \??\c:\windows\Fonts\svchost.exe
      c:\windows\Fonts\svchost.exe set MicrosotMaims DisplayName Network Location Service
      2⤵
      • Executes dropped EXE
      PID:5028
    • \??\c:\windows\Fonts\svchost.exe
      c:\windows\Fonts\svchost.exe set MicrosotMaims Description Provides performance library information from Windows Management.
      2⤵
      • Executes dropped EXE
      PID:3992
    • \??\c:\windows\Fonts\svchost.exe
      c:\windows\Fonts\svchost.exe start MicrosotMaims
      2⤵
      • Executes dropped EXE
      PID:1396
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\tem.vbs"
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:4720

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tem.vbs

    Filesize

    275B

    MD5

    f709885679418637442330ed6d445fe4

    SHA1

    175f52af23a7ae847e0f4ba134c95e3a5a8cba1a

    SHA256

    62560ead9fcdcc8d7a4738c184ff91e37b0a0ddc5c49bfe9f3672be0a799404c

    SHA512

    8773fd2386047226fc4507a2cec0b263ccbb73b26838967faebdb25bf78787db80adbfadd67eab52356f5de21ce2db7107590c3e338e488f3e82ae5f1aa2c307

  • C:\Windows\Fonts\svchost.exe

    Filesize

    87KB

    MD5

    3215a773eecd1089babe6b9975086ebd

    SHA1

    6f28080e58149aeb72dfd0f2568ce80de4eff43c

    SHA256

    516319905545cf575de3322f7733d99d5293df4a38d46fccf1a41e23b64d2d6c

    SHA512

    664c519958fa80bb266764bf58543e9bd67665b540a78b9e7db4f25729c00fefbe5768a4fe75fa0b7905b19c9a02ba88b09e1eaef578593d5e97f450e22227ad

  • memory/1396-22-0x0000000140000000-0x0000000140053000-memory.dmp

    Filesize

    332KB

  • memory/3724-15-0x0000000140000000-0x0000000140053000-memory.dmp

    Filesize

    332KB

  • memory/3724-26-0x0000000140000000-0x0000000140053000-memory.dmp

    Filesize

    332KB

  • memory/3976-0-0x0000000000400000-0x0000000000DEC000-memory.dmp

    Filesize

    9.9MB

  • memory/3976-30-0x0000000000400000-0x0000000000DEC000-memory.dmp

    Filesize

    9.9MB

  • memory/3992-24-0x0000000140000000-0x0000000140053000-memory.dmp

    Filesize

    332KB

  • memory/5028-20-0x0000000140000000-0x0000000140053000-memory.dmp

    Filesize

    332KB