Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23/08/2024, 23:03
Static task
static1
Behavioral task
behavioral1
Sample
8966611914e4ada512b28528616ea242d44c20e3eda72e0a4d09e1458f60d352.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8966611914e4ada512b28528616ea242d44c20e3eda72e0a4d09e1458f60d352.exe
Resource
win10v2004-20240802-en
General
-
Target
8966611914e4ada512b28528616ea242d44c20e3eda72e0a4d09e1458f60d352.exe
-
Size
464KB
-
MD5
a2c3b643b091bf2f7b0c9cc8e0f02f55
-
SHA1
be1bf750e12e9a998f361c954e50941a631d1d4e
-
SHA256
8966611914e4ada512b28528616ea242d44c20e3eda72e0a4d09e1458f60d352
-
SHA512
92bb032ceb0fc4b5ca80021d83736ae4180f2bc23cb1249388c78342a28938e8b1b74e1075b4bd0a75a0f71bc3beabaae74635d58c0d9d4c0c2538bfb9ab7226
-
SSDEEP
12288:xGlc87eqqV5e+wBV6O+Nf1EJvLIjh5XakIaPW:xGSqqHeVBxxDuFIau
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2096 EhStunch.exe 372 autoinfo.exe 1904 ~8935.tmp -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\certuthn = "C:\\Users\\Admin\\AppData\\Roaming\\fingougc\\EhStunch.exe" 8966611914e4ada512b28528616ea242d44c20e3eda72e0a4d09e1458f60d352.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\autoinfo.exe 8966611914e4ada512b28528616ea242d44c20e3eda72e0a4d09e1458f60d352.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8966611914e4ada512b28528616ea242d44c20e3eda72e0a4d09e1458f60d352.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EhStunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language autoinfo.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2096 EhStunch.exe 2096 EhStunch.exe 3332 Explorer.EXE 3332 Explorer.EXE 3332 Explorer.EXE 3332 Explorer.EXE 3332 Explorer.EXE 3332 Explorer.EXE 3332 Explorer.EXE 3332 Explorer.EXE 3332 Explorer.EXE 3332 Explorer.EXE 3332 Explorer.EXE 3332 Explorer.EXE 3332 Explorer.EXE 3332 Explorer.EXE 3332 Explorer.EXE 3332 Explorer.EXE 3332 Explorer.EXE 3332 Explorer.EXE 3332 Explorer.EXE 3332 Explorer.EXE 3332 Explorer.EXE 3332 Explorer.EXE 3332 Explorer.EXE 3332 Explorer.EXE 3332 Explorer.EXE 3332 Explorer.EXE 3332 Explorer.EXE 3332 Explorer.EXE 3332 Explorer.EXE 3332 Explorer.EXE 3332 Explorer.EXE 3332 Explorer.EXE 3332 Explorer.EXE 3332 Explorer.EXE 3332 Explorer.EXE 3332 Explorer.EXE 3332 Explorer.EXE 3332 Explorer.EXE 3332 Explorer.EXE 3332 Explorer.EXE 3332 Explorer.EXE 3332 Explorer.EXE 3332 Explorer.EXE 3332 Explorer.EXE 3332 Explorer.EXE 3332 Explorer.EXE 3332 Explorer.EXE 3332 Explorer.EXE 3332 Explorer.EXE 3332 Explorer.EXE 3332 Explorer.EXE 3332 Explorer.EXE 3332 Explorer.EXE 3332 Explorer.EXE 3332 Explorer.EXE 3332 Explorer.EXE 3332 Explorer.EXE 3332 Explorer.EXE 3332 Explorer.EXE 3332 Explorer.EXE 3332 Explorer.EXE 3332 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 17 IoCs
description pid Process Token: SeDebugPrivilege 2096 EhStunch.exe Token: SeShutdownPrivilege 3332 Explorer.EXE Token: SeCreatePagefilePrivilege 3332 Explorer.EXE Token: SeShutdownPrivilege 3332 Explorer.EXE Token: SeCreatePagefilePrivilege 3332 Explorer.EXE Token: SeShutdownPrivilege 3332 Explorer.EXE Token: SeCreatePagefilePrivilege 3332 Explorer.EXE Token: SeShutdownPrivilege 3332 Explorer.EXE Token: SeCreatePagefilePrivilege 3332 Explorer.EXE Token: SeShutdownPrivilege 3332 Explorer.EXE Token: SeCreatePagefilePrivilege 3332 Explorer.EXE Token: SeShutdownPrivilege 3332 Explorer.EXE Token: SeCreatePagefilePrivilege 3332 Explorer.EXE Token: SeShutdownPrivilege 3332 Explorer.EXE Token: SeCreatePagefilePrivilege 3332 Explorer.EXE Token: SeShutdownPrivilege 3332 Explorer.EXE Token: SeCreatePagefilePrivilege 3332 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3332 Explorer.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4940 wrote to memory of 2096 4940 8966611914e4ada512b28528616ea242d44c20e3eda72e0a4d09e1458f60d352.exe 88 PID 4940 wrote to memory of 2096 4940 8966611914e4ada512b28528616ea242d44c20e3eda72e0a4d09e1458f60d352.exe 88 PID 4940 wrote to memory of 2096 4940 8966611914e4ada512b28528616ea242d44c20e3eda72e0a4d09e1458f60d352.exe 88 PID 2096 wrote to memory of 1904 2096 EhStunch.exe 90 PID 2096 wrote to memory of 1904 2096 EhStunch.exe 90 PID 1904 wrote to memory of 3332 1904 ~8935.tmp 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
PID:3332 -
C:\Users\Admin\AppData\Local\Temp\8966611914e4ada512b28528616ea242d44c20e3eda72e0a4d09e1458f60d352.exe"C:\Users\Admin\AppData\Local\Temp\8966611914e4ada512b28528616ea242d44c20e3eda72e0a4d09e1458f60d352.exe"2⤵
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Users\Admin\AppData\Roaming\fingougc\EhStunch.exe"C:\Users\Admin\AppData\Roaming\fingougc"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\~8935.tmp3332 475144 2096 14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1904
-
-
-
-
C:\Windows\SysWOW64\autoinfo.exeC:\Windows\SysWOW64\autoinfo.exe -s1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:372
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD586dc243576cf5c7445451af37631eea9
SHA199a81c47c4c02f32c0ab456bfa23c306c7a09bf9
SHA25625d2a671e1b5b5b95697ac0234ce4d46e0d0894919521b54aabebd9daecf994a
SHA512c7310524f9b65f811146c1eb6ae944966351ac88a95fbc1ac422d8810730e5e212a7e28090ad758ea23c96ba38073e7fcf42460575e7f09dbc759a45c5d5a4a4
-
Filesize
464KB
MD5c0b68f72b8eae141d0b3b086d8842295
SHA11d81e8273f094c259b91836c6784e11a041ff509
SHA25612f5d8633b32079e9e8e5a339a483856eac748aa14d155c420dfa35e3ef205d5
SHA51290d93f0dcc3d449eb188e345bc1a417bb8c55ddd055e3d3d6da86f740eee46051298c0d1fb9f728be1a8f133bf97baac1e7815e2fe082bf1ff20ee38d9268185