Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03/09/2024, 11:12
Static task
static1
Behavioral task
behavioral1
Sample
f754fefacb54d2b54d232a2465cfee59e3393fbc5a5fb1061709bebf06e74c89.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f754fefacb54d2b54d232a2465cfee59e3393fbc5a5fb1061709bebf06e74c89.exe
Resource
win10v2004-20240802-en
General
-
Target
f754fefacb54d2b54d232a2465cfee59e3393fbc5a5fb1061709bebf06e74c89.exe
-
Size
424KB
-
MD5
121afc27b0e1abe1704bcabf3c8b8ec3
-
SHA1
9bdb3491f8d836af15f09cac82be9e6b05560204
-
SHA256
f754fefacb54d2b54d232a2465cfee59e3393fbc5a5fb1061709bebf06e74c89
-
SHA512
127866745bf3c26a82774f1a5ef8b9e3e60883b9b53f8388813a4c6145bfeb1a695a37e9aa90a2e9bf86e1a976ea9e3672c00b48ce6cfc8a7ce8e5382f99df28
-
SSDEEP
6144:d4VDHxb4QmAqozabdh1GbhYzTp7Hw2mrbX58BvT3pYXjadGfqrACFoV:dgkcq2abdh1GbhYPprwxbJmrp+aYq8M
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation f754fefacb54d2b54d232a2465cfee59e3393fbc5a5fb1061709bebf06e74c89.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\IntelPowerAgent5 = "rundll32.exe shell32.dll, ShellExec_RunDLL C:\\PROGRA~3\\228002~1.EXE" backgroundTaskHost.exe -
Checks for any installed AV software in registry 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Avira backgroundTaskHost.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\AVAST Software\Avast backgroundTaskHost.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Eset\Nod backgroundTaskHost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2596 set thread context of 4424 2596 f754fefacb54d2b54d232a2465cfee59e3393fbc5a5fb1061709bebf06e74c89.exe 97 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f754fefacb54d2b54d232a2465cfee59e3393fbc5a5fb1061709bebf06e74c89.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language backgroundTaskHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4424 backgroundTaskHost.exe 4424 backgroundTaskHost.exe 4424 backgroundTaskHost.exe 4424 backgroundTaskHost.exe 4424 backgroundTaskHost.exe 4424 backgroundTaskHost.exe 4424 backgroundTaskHost.exe 4424 backgroundTaskHost.exe 4424 backgroundTaskHost.exe 4424 backgroundTaskHost.exe 4424 backgroundTaskHost.exe 4424 backgroundTaskHost.exe 4424 backgroundTaskHost.exe 4424 backgroundTaskHost.exe 4424 backgroundTaskHost.exe 4424 backgroundTaskHost.exe 4424 backgroundTaskHost.exe 4424 backgroundTaskHost.exe 4424 backgroundTaskHost.exe 4424 backgroundTaskHost.exe 4424 backgroundTaskHost.exe 4424 backgroundTaskHost.exe 4424 backgroundTaskHost.exe 4424 backgroundTaskHost.exe 4424 backgroundTaskHost.exe 4424 backgroundTaskHost.exe 4424 backgroundTaskHost.exe 4424 backgroundTaskHost.exe 4424 backgroundTaskHost.exe 4424 backgroundTaskHost.exe 4424 backgroundTaskHost.exe 4424 backgroundTaskHost.exe 4424 backgroundTaskHost.exe 4424 backgroundTaskHost.exe 4424 backgroundTaskHost.exe 4424 backgroundTaskHost.exe 4424 backgroundTaskHost.exe 4424 backgroundTaskHost.exe 4424 backgroundTaskHost.exe 4424 backgroundTaskHost.exe 4424 backgroundTaskHost.exe 4424 backgroundTaskHost.exe 4424 backgroundTaskHost.exe 4424 backgroundTaskHost.exe 4424 backgroundTaskHost.exe 4424 backgroundTaskHost.exe 4424 backgroundTaskHost.exe 4424 backgroundTaskHost.exe 4424 backgroundTaskHost.exe 4424 backgroundTaskHost.exe 4424 backgroundTaskHost.exe 4424 backgroundTaskHost.exe 4424 backgroundTaskHost.exe 4424 backgroundTaskHost.exe 4424 backgroundTaskHost.exe 4424 backgroundTaskHost.exe 4424 backgroundTaskHost.exe 4424 backgroundTaskHost.exe 4424 backgroundTaskHost.exe 4424 backgroundTaskHost.exe 4424 backgroundTaskHost.exe 4424 backgroundTaskHost.exe 4424 backgroundTaskHost.exe 4424 backgroundTaskHost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2596 f754fefacb54d2b54d232a2465cfee59e3393fbc5a5fb1061709bebf06e74c89.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2596 wrote to memory of 4424 2596 f754fefacb54d2b54d232a2465cfee59e3393fbc5a5fb1061709bebf06e74c89.exe 97 PID 2596 wrote to memory of 4424 2596 f754fefacb54d2b54d232a2465cfee59e3393fbc5a5fb1061709bebf06e74c89.exe 97 PID 2596 wrote to memory of 4424 2596 f754fefacb54d2b54d232a2465cfee59e3393fbc5a5fb1061709bebf06e74c89.exe 97 PID 2596 wrote to memory of 4424 2596 f754fefacb54d2b54d232a2465cfee59e3393fbc5a5fb1061709bebf06e74c89.exe 97 PID 2596 wrote to memory of 4424 2596 f754fefacb54d2b54d232a2465cfee59e3393fbc5a5fb1061709bebf06e74c89.exe 97 PID 2596 wrote to memory of 4424 2596 f754fefacb54d2b54d232a2465cfee59e3393fbc5a5fb1061709bebf06e74c89.exe 97 PID 2596 wrote to memory of 4424 2596 f754fefacb54d2b54d232a2465cfee59e3393fbc5a5fb1061709bebf06e74c89.exe 97 PID 2596 wrote to memory of 4424 2596 f754fefacb54d2b54d232a2465cfee59e3393fbc5a5fb1061709bebf06e74c89.exe 97 PID 2596 wrote to memory of 4424 2596 f754fefacb54d2b54d232a2465cfee59e3393fbc5a5fb1061709bebf06e74c89.exe 97 PID 2596 wrote to memory of 4424 2596 f754fefacb54d2b54d232a2465cfee59e3393fbc5a5fb1061709bebf06e74c89.exe 97 PID 2596 wrote to memory of 4424 2596 f754fefacb54d2b54d232a2465cfee59e3393fbc5a5fb1061709bebf06e74c89.exe 97 PID 2596 wrote to memory of 936 2596 f754fefacb54d2b54d232a2465cfee59e3393fbc5a5fb1061709bebf06e74c89.exe 98 PID 2596 wrote to memory of 936 2596 f754fefacb54d2b54d232a2465cfee59e3393fbc5a5fb1061709bebf06e74c89.exe 98 PID 2596 wrote to memory of 936 2596 f754fefacb54d2b54d232a2465cfee59e3393fbc5a5fb1061709bebf06e74c89.exe 98 PID 936 wrote to memory of 116 936 cmd.exe 101 PID 936 wrote to memory of 116 936 cmd.exe 101 PID 936 wrote to memory of 116 936 cmd.exe 101 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 116 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f754fefacb54d2b54d232a2465cfee59e3393fbc5a5fb1061709bebf06e74c89.exe"C:\Users\Admin\AppData\Local\Temp\f754fefacb54d2b54d232a2465cfee59e3393fbc5a5fb1061709bebf06e74c89.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\backgroundTaskHost.exe"backgroundTaskHost.exe"2⤵
- Adds Run key to start application
- Checks for any installed AV software in registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4424
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\sfrAEF8.tmp.bat" "C:\Users\Admin\AppData\Local\Temp\f754fefacb54d2b54d232a2465cfee59e3393fbc5a5fb1061709bebf06e74c89.exe""2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Windows\SysWOW64\attrib.exeattrib -r -s -h "C:\Users\Admin\AppData\Local\Temp\f754fefacb54d2b54d232a2465cfee59e3393fbc5a5fb1061709bebf06e74c89.exe"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:116
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
424KB
MD565a253d7250f0a0bcd82780276e19095
SHA10a2e99067adfe298c5d92dc7a3be8dc9926e1f87
SHA25676db8431a9b4f6ff9af0868aa92cf1ef1ac9c916f16a269dd4a2601a9e54dff9
SHA512d38376ef90d966f414f3d2d6b38c76e3af7f5637c3ce67a02cf6de57d5d9bcff972fc6b606e77472bfed9458659c276b9a1c2f6ccb7a22e6818943a9f0cf4b40
-
Filesize
29B
MD5762ca80be07117bdc863fa0e64744466
SHA1f0d62ab25e76d1aa1f51be9c4b3c1f29a8ed67dd
SHA25696752f2296892207bee4deb4e213f5d9fde9b45928fb5510b6dba5144ce5d894
SHA5126fce79be72ea6cd8da9f6ae5a3f1a87daa349a64bd6d31d9463bea1a197c1d4bc321cfadeed0bcd8006665a87065aed7e6f9fd7b3d2e0e6c3b1e3d90cce6455a
-
Filesize
58B
MD5472c8dbc6434ff457011d74b55044f60
SHA1ba9c40fd5664cea88379dc75fd425f5e4e3d7ff7
SHA256ad35b486e41c0e67e8b0f247d329841e1bacdea1543a14d8349765b835eed58d
SHA5121dc80f91a31c62aa97bb024710c48f3da2722200f26a24ae5a519bf1a3d14302fbb233a66a8c5dcd25e72e49e35904a8c181da97a409e8179ed76872ff3bc546