Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2024, 07:34
Static task
static1
Behavioral task
behavioral1
Sample
5d2011a5cc2262be1edafb45a3ca6e90N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5d2011a5cc2262be1edafb45a3ca6e90N.exe
Resource
win10v2004-20240802-en
General
-
Target
5d2011a5cc2262be1edafb45a3ca6e90N.exe
-
Size
88KB
-
MD5
5d2011a5cc2262be1edafb45a3ca6e90
-
SHA1
b0b3a24fd738e7f34f70392f70909503b2c98a0a
-
SHA256
0b5393254bb075346c491dfbc15a4e679146ece53483517463551c136739ba27
-
SHA512
585e4fd0c27f14bde66e098b07cdeeae50f9a484986a1e3e250d2d31f7504acce6f549b45ab05f1412db68486592a26a76bbf3e8ad81916ef76fab8021ba3f26
-
SSDEEP
1536:ahUDofByDJWbMGcEFLPEPKOJUsy1+VMA:aIofBHbKMP0PvMA
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation explorer.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation 5d2011a5cc2262be1edafb45a3ca6e90N.exe -
Executes dropped EXE 4 IoCs
pid Process 640 explorer.exe 1060 explorer.exe 4304 explorer.exe 904 explorer.exe -
resource yara_rule behavioral2/memory/4764-14-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4764-16-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4764-18-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4764-61-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4764-65-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/1060-95-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Video Driver = "C:\\Users\\Admin\\AppData\\Roaming\\config\\explorer.exe" reg.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4024 set thread context of 4764 4024 5d2011a5cc2262be1edafb45a3ca6e90N.exe 87 PID 640 set thread context of 1060 640 explorer.exe 93 PID 640 set thread context of 4304 640 explorer.exe 94 PID 4304 set thread context of 904 4304 explorer.exe 97 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5d2011a5cc2262be1edafb45a3ca6e90N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5d2011a5cc2262be1edafb45a3ca6e90N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1060 explorer.exe Token: SeDebugPrivilege 1060 explorer.exe Token: SeDebugPrivilege 1060 explorer.exe Token: SeDebugPrivilege 1060 explorer.exe Token: SeDebugPrivilege 1060 explorer.exe Token: SeDebugPrivilege 1060 explorer.exe Token: SeDebugPrivilege 1060 explorer.exe Token: SeDebugPrivilege 1060 explorer.exe Token: SeDebugPrivilege 1060 explorer.exe Token: SeDebugPrivilege 1060 explorer.exe Token: SeDebugPrivilege 1060 explorer.exe Token: SeDebugPrivilege 1060 explorer.exe Token: SeDebugPrivilege 1060 explorer.exe Token: SeDebugPrivilege 1060 explorer.exe Token: SeDebugPrivilege 1060 explorer.exe Token: SeDebugPrivilege 1060 explorer.exe Token: SeDebugPrivilege 1060 explorer.exe Token: SeDebugPrivilege 1060 explorer.exe Token: SeDebugPrivilege 1060 explorer.exe Token: SeDebugPrivilege 1060 explorer.exe Token: SeDebugPrivilege 1060 explorer.exe Token: SeDebugPrivilege 1060 explorer.exe Token: SeDebugPrivilege 1060 explorer.exe Token: SeDebugPrivilege 1060 explorer.exe Token: SeDebugPrivilege 1060 explorer.exe Token: SeDebugPrivilege 1060 explorer.exe Token: SeDebugPrivilege 1060 explorer.exe Token: SeDebugPrivilege 1060 explorer.exe Token: SeDebugPrivilege 1060 explorer.exe Token: SeDebugPrivilege 1060 explorer.exe Token: SeDebugPrivilege 1060 explorer.exe Token: SeDebugPrivilege 1060 explorer.exe Token: SeDebugPrivilege 1060 explorer.exe Token: SeDebugPrivilege 1060 explorer.exe Token: SeDebugPrivilege 1060 explorer.exe Token: SeDebugPrivilege 1060 explorer.exe Token: SeDebugPrivilege 1060 explorer.exe Token: SeDebugPrivilege 1060 explorer.exe Token: SeDebugPrivilege 1060 explorer.exe Token: SeDebugPrivilege 1060 explorer.exe Token: SeDebugPrivilege 1060 explorer.exe Token: SeDebugPrivilege 1060 explorer.exe Token: SeDebugPrivilege 1060 explorer.exe Token: SeDebugPrivilege 1060 explorer.exe Token: SeDebugPrivilege 1060 explorer.exe Token: SeDebugPrivilege 1060 explorer.exe Token: SeDebugPrivilege 1060 explorer.exe Token: SeDebugPrivilege 1060 explorer.exe Token: SeDebugPrivilege 1060 explorer.exe Token: SeDebugPrivilege 1060 explorer.exe Token: SeDebugPrivilege 1060 explorer.exe Token: SeDebugPrivilege 1060 explorer.exe Token: SeDebugPrivilege 1060 explorer.exe Token: SeDebugPrivilege 1060 explorer.exe Token: SeDebugPrivilege 1060 explorer.exe Token: SeDebugPrivilege 1060 explorer.exe Token: SeDebugPrivilege 1060 explorer.exe Token: SeDebugPrivilege 1060 explorer.exe Token: SeDebugPrivilege 1060 explorer.exe Token: SeDebugPrivilege 1060 explorer.exe Token: SeDebugPrivilege 1060 explorer.exe Token: SeDebugPrivilege 1060 explorer.exe Token: SeDebugPrivilege 1060 explorer.exe Token: SeDebugPrivilege 1060 explorer.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4024 5d2011a5cc2262be1edafb45a3ca6e90N.exe 4764 5d2011a5cc2262be1edafb45a3ca6e90N.exe 640 explorer.exe 1060 explorer.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 4024 wrote to memory of 4764 4024 5d2011a5cc2262be1edafb45a3ca6e90N.exe 87 PID 4024 wrote to memory of 4764 4024 5d2011a5cc2262be1edafb45a3ca6e90N.exe 87 PID 4024 wrote to memory of 4764 4024 5d2011a5cc2262be1edafb45a3ca6e90N.exe 87 PID 4024 wrote to memory of 4764 4024 5d2011a5cc2262be1edafb45a3ca6e90N.exe 87 PID 4024 wrote to memory of 4764 4024 5d2011a5cc2262be1edafb45a3ca6e90N.exe 87 PID 4024 wrote to memory of 4764 4024 5d2011a5cc2262be1edafb45a3ca6e90N.exe 87 PID 4024 wrote to memory of 4764 4024 5d2011a5cc2262be1edafb45a3ca6e90N.exe 87 PID 4024 wrote to memory of 4764 4024 5d2011a5cc2262be1edafb45a3ca6e90N.exe 87 PID 4764 wrote to memory of 2912 4764 5d2011a5cc2262be1edafb45a3ca6e90N.exe 88 PID 4764 wrote to memory of 2912 4764 5d2011a5cc2262be1edafb45a3ca6e90N.exe 88 PID 4764 wrote to memory of 2912 4764 5d2011a5cc2262be1edafb45a3ca6e90N.exe 88 PID 2912 wrote to memory of 3516 2912 cmd.exe 91 PID 2912 wrote to memory of 3516 2912 cmd.exe 91 PID 2912 wrote to memory of 3516 2912 cmd.exe 91 PID 4764 wrote to memory of 640 4764 5d2011a5cc2262be1edafb45a3ca6e90N.exe 92 PID 4764 wrote to memory of 640 4764 5d2011a5cc2262be1edafb45a3ca6e90N.exe 92 PID 4764 wrote to memory of 640 4764 5d2011a5cc2262be1edafb45a3ca6e90N.exe 92 PID 640 wrote to memory of 1060 640 explorer.exe 93 PID 640 wrote to memory of 1060 640 explorer.exe 93 PID 640 wrote to memory of 1060 640 explorer.exe 93 PID 640 wrote to memory of 1060 640 explorer.exe 93 PID 640 wrote to memory of 1060 640 explorer.exe 93 PID 640 wrote to memory of 1060 640 explorer.exe 93 PID 640 wrote to memory of 1060 640 explorer.exe 93 PID 640 wrote to memory of 1060 640 explorer.exe 93 PID 640 wrote to memory of 4304 640 explorer.exe 94 PID 640 wrote to memory of 4304 640 explorer.exe 94 PID 640 wrote to memory of 4304 640 explorer.exe 94 PID 640 wrote to memory of 4304 640 explorer.exe 94 PID 640 wrote to memory of 4304 640 explorer.exe 94 PID 640 wrote to memory of 4304 640 explorer.exe 94 PID 640 wrote to memory of 4304 640 explorer.exe 94 PID 4304 wrote to memory of 904 4304 explorer.exe 97 PID 4304 wrote to memory of 904 4304 explorer.exe 97 PID 4304 wrote to memory of 904 4304 explorer.exe 97 PID 4304 wrote to memory of 904 4304 explorer.exe 97 PID 4304 wrote to memory of 904 4304 explorer.exe 97 PID 4304 wrote to memory of 904 4304 explorer.exe 97 PID 4304 wrote to memory of 904 4304 explorer.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\5d2011a5cc2262be1edafb45a3ca6e90N.exe"C:\Users\Admin\AppData\Local\Temp\5d2011a5cc2262be1edafb45a3ca6e90N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Users\Admin\AppData\Local\Temp\5d2011a5cc2262be1edafb45a3ca6e90N.exe"C:\Users\Admin\AppData\Local\Temp\5d2011a5cc2262be1edafb45a3ca6e90N.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\UXINS.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Video Driver" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\config\explorer.exe" /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3516
-
-
-
C:\Users\Admin\AppData\Roaming\config\explorer.exe"C:\Users\Admin\AppData\Roaming\config\explorer.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Users\Admin\AppData\Roaming\config\explorer.exe"C:\Users\Admin\AppData\Roaming\config\explorer.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1060
-
-
C:\Users\Admin\AppData\Roaming\config\explorer.exe"C:\Users\Admin\AppData\Roaming\config\explorer.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Users\Admin\AppData\Roaming\config\explorer.exe"C:\Users\Admin\AppData\Roaming\config\explorer.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:904
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
294B
MD5348f616131969356a3cd8bdf4f14a731
SHA166fd58e1644841892dbeeb2cec38370e974739f9
SHA256df23afad919ebc1556fb133e655ad3fd8629da3538a3accfa7c39cdbefb72739
SHA5126a62f0195c899bf8e43d777c306abfdfe9d4a737f64b724d53d7ce1a42e33a59f064c87196fd41a098db217043cb00ee8bef77023ed53d688ce924998ea7de45
-
Filesize
149B
MD5fc1798b7c7938454220fda837a76f354
SHA1b232912930b2bc24ff18bf7ecd58f872bbe01ea0
SHA2567f0a5917b5aca9c5beb153aad0ef95bf0aeafb83768da5b086c3f029ba42d7c8
SHA512d1abdd45a8e5d33893b9d19424174a07feed145d2e6b4be318ab5fde503f850579a4a101a010f30e16ecde2c7123f45357a8341214655321ee0f0097ca911331
-
Filesize
88KB
MD54011cab0748fd19d2289bbcedbda0251
SHA1d7fb85c80d5bc2d821590a6576742002314e7a2b
SHA256a82b16dc56dc04b88cb3aa6e9931b205914af70ed1a30c6dece27335f13ba39c
SHA512587a2f1089006f61a5574969a381a2281da951e2f87acb69668a0423e32254d83af738037bfe434378fb0d7959d5e7eccfe50a8a4db97af3cc092a4fe86d2d2c