Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    264s
  • max time network
    277s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    05/09/2024, 22:50

General

  • Target

    d480b6efcf1ccdc3a7cf4c1d22839e27e9701758b19c0a197b049b66bdcfe870.exe

  • Size

    1.7MB

  • MD5

    1959ce1e98b798963f8b7d04bfb71e69

  • SHA1

    3f2fb337ca2f2686e55b985e1f4020e2273bc5a8

  • SHA256

    d480b6efcf1ccdc3a7cf4c1d22839e27e9701758b19c0a197b049b66bdcfe870

  • SHA512

    8e736a00b4077d32e11c6ae100d4148033c5b6bdbb2a874f707c3315db5ac61798cc310198aac97f4c29ae04f45d34e0a2d45a57cb43bd5536e7f3199add3e8c

  • SSDEEP

    49152:eo2sTMKEpK0Y6d84LE1pM5bK0dRfBp8N6eopiaj7EvwtCpLdiXr9fpJ2M67:l2sTMKEpK0Y6dTE1pM5bK0dRfBp8N6eL

Malware Config

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 16 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3472
      • C:\Users\Admin\AppData\Local\Temp\d480b6efcf1ccdc3a7cf4c1d22839e27e9701758b19c0a197b049b66bdcfe870.exe
        "C:\Users\Admin\AppData\Local\Temp\d480b6efcf1ccdc3a7cf4c1d22839e27e9701758b19c0a197b049b66bdcfe870.exe"
        2⤵
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:516
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k move Command Command.bat & Command.bat & exit
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3656
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            4⤵
            • Enumerates processes with tasklist
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:3152
          • C:\Windows\SysWOW64\findstr.exe
            findstr /I "wrsa opssvc"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:3180
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            4⤵
            • Enumerates processes with tasklist
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:2268
          • C:\Windows\SysWOW64\findstr.exe
            findstr /I "avastui avgui bdservicehost nswscsvc sophoshealth"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:3188
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c md 627000
            4⤵
            • System Location Discovery: System Language Discovery
            PID:204
          • C:\Windows\SysWOW64\findstr.exe
            findstr /V "possiblebasicshtmlensure" Brisbane
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2480
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c copy /b ..\Pace + ..\Proved + ..\Accessing + ..\Reaches + ..\Compressed + ..\Po + ..\Itsa + ..\Major + ..\Shares + ..\Resolutions + ..\Write + ..\Hosting + ..\Hospital a
            4⤵
            • System Location Discovery: System Language Discovery
            PID:1400
          • C:\Users\Admin\AppData\Local\Temp\627000\Legitimate.pif
            Legitimate.pif a
            4⤵
            • Suspicious use of NtCreateUserProcessOtherParentProcess
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:4064
            • C:\Users\Admin\AppData\Local\Temp\627000\RegAsm.exe
              C:\Users\Admin\AppData\Local\Temp\627000\RegAsm.exe
              5⤵
              • Executes dropped EXE
              PID:4304
            • C:\Users\Admin\AppData\Local\Temp\627000\RegAsm.exe
              C:\Users\Admin\AppData\Local\Temp\627000\RegAsm.exe
              5⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              PID:860
          • C:\Windows\SysWOW64\choice.exe
            choice /d y /t 5
            4⤵
            • System Location Discovery: System Language Discovery
            PID:4892
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c schtasks.exe /create /tn "Colour" /tr "wscript //B 'C:\Users\Admin\AppData\Local\InnoCode360 Technologies Co\CodeInno360.js'" /sc minute /mo 5 /F
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2000
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks.exe /create /tn "Colour" /tr "wscript //B 'C:\Users\Admin\AppData\Local\InnoCode360 Technologies Co\CodeInno360.js'" /sc minute /mo 5 /F
          3⤵
          • System Location Discovery: System Language Discovery
          • Scheduled Task/Job: Scheduled Task
          PID:1644
      • C:\Windows\SysWOW64\cmd.exe
        cmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CodeInno360.url" & echo URL="C:\Users\Admin\AppData\Local\InnoCode360 Technologies Co\CodeInno360.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CodeInno360.url" & exit
        2⤵
        • Drops startup file
        • System Location Discovery: System Language Discovery
        PID:4408
    • \??\c:\windows\system32\wscript.EXE
      c:\windows\system32\wscript.EXE //B "C:\Users\Admin\AppData\Local\InnoCode360 Technologies Co\CodeInno360.js"
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:2860
      • C:\Users\Admin\AppData\Local\InnoCode360 Technologies Co\CodeInno360.scr
        "C:\Users\Admin\AppData\Local\InnoCode360 Technologies Co\CodeInno360.scr" "C:\Users\Admin\AppData\Local\InnoCode360 Technologies Co\o"
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1424

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\InnoCode360 Technologies Co\CodeInno360.js

      Filesize

      194B

      MD5

      1d41db49c62160fa6b7ae7017d0978c8

      SHA1

      d7aa8b6ae0b139d575a8d62addea8ba854f42eb4

      SHA256

      550e45cc04fc36cd37370a9df6f98bacca638c5a7b8ee93de08a3ab0fc2db59f

      SHA512

      e32ec978f42230652d421453423a9c1d8c7b7374db4511cb396f668256d6ffb5765dcba0e2e06e4bf344bb8336ac41815b712060ba549e579cba5811a20f10c1

    • C:\Users\Admin\AppData\Local\Temp\627000\Legitimate.pif

      Filesize

      872KB

      MD5

      18ce19b57f43ce0a5af149c96aecc685

      SHA1

      1bd5ca29fc35fc8ac346f23b155337c5b28bbc36

      SHA256

      d8b7c7178fbadbf169294e4f29dce582f89a5cf372e9da9215aa082330dc12fd

      SHA512

      a0c58f04dfb49272a2b6f1e8ce3f541a030a6c7a09bb040e660fc4cd9892ca3ac39cf3d6754c125f7cd1987d1fca01640a153519b4e2eb3e3b4b8c9dc1480558

    • C:\Users\Admin\AppData\Local\Temp\627000\RegAsm.exe

      Filesize

      63KB

      MD5

      b58b926c3574d28d5b7fdd2ca3ec30d5

      SHA1

      d260c4ffd603a9cfc057fcb83d678b1cecdf86f9

      SHA256

      6e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3

      SHA512

      b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab

    • C:\Users\Admin\AppData\Local\Temp\627000\a

      Filesize

      911KB

      MD5

      6297235a485d3448d2c41335eaffc550

      SHA1

      5f6c302a27c9a0a987d3fb2b9dc8c1ffcd3a1b42

      SHA256

      9fed9159a76f9671a9f2dcc3ea03a01e73e743d03b221057f499eb566edeb7ba

      SHA512

      40ce01e9f7274bc98b7e9a339b27dc49e585defb92475a54af480266f27c2fc04c956618fe27b5828d640f35e844b5d3bcaad1d6acbd185ad6ca1cb6588481d5

    • C:\Users\Admin\AppData\Local\Temp\Accessing

      Filesize

      92KB

      MD5

      0660597107fdecc6caa17c15478250ba

      SHA1

      b7d15f234dde86dedb70a5160ed926a7e3db36ff

      SHA256

      ec16ee65b59f694067f8630f37e9828a7c293ac5a4fc35b3e2613dc31d38f13e

      SHA512

      3e8c61a1903b38637ff5d50368244a005fd2582b59001126b945e759d3b9c501a3a7bcfd8075f11f4dc9aa6fb4676fa0153e143682034f9b4da4b46f109644ab

    • C:\Users\Admin\AppData\Local\Temp\Brisbane

      Filesize

      758B

      MD5

      d3ef49de39be08594781cedbe506879c

      SHA1

      1c4767ba9fae1286453ebaa99b1944bad7f7394f

      SHA256

      24ac168fad30c8981fb1a05b5519a5c062ab2b25616180b8609d31a754e92070

      SHA512

      bd3655433e524bfc8d9a3a92d569d5e1031baf45185933b96d209fadfbdcf5b469b6c56fcffda6afa56cc81c8304e33b5594b96d1c0fd085b43676a24dc3dcf3

    • C:\Users\Admin\AppData\Local\Temp\Command

      Filesize

      27KB

      MD5

      22af1c01d5011f1f0fb02abd46eec3d7

      SHA1

      004f5b13fb6071a31f78308c8ef1fd19d59731c2

      SHA256

      20da2c26bdf7adbbc3fcb887a7d6061c1e2834d589a24699a86b810b6edf83c4

      SHA512

      9ccfba21c24926648cbae40e9b7a01a45acf22161d417c772776119f23da93019cf419f9c2881592c4ae0b2705e0a13dee2715af65d9f7d91c18891b9433d56d

    • C:\Users\Admin\AppData\Local\Temp\Compressed

      Filesize

      77KB

      MD5

      c847a7c2004ff04522106f8865745b91

      SHA1

      05135f0531b7806dbd274ee91c9137a1e1089e49

      SHA256

      2a658a55624d7f653647ceeae7aad664c5c982371aba6ecc7bbf556fb9c9f16a

      SHA512

      5cc4135e3e7ddae0230df05d52a10e2745887fa20a9f80faf8467590aad152093b9e6bdaf43f99f46fb948900328a0b58f9985afdfc7802a06e1dbd419142a9c

    • C:\Users\Admin\AppData\Local\Temp\Developers

      Filesize

      871KB

      MD5

      9c841babc2fc25358efece82d2a83ed6

      SHA1

      49b18eb448738b94edeca06171c64848b6694555

      SHA256

      4732770184b8a59ff69720c1c0c16596c63c26a2a7367b64810a91d0f14f1f85

      SHA512

      f35fb5d51ec22b942414788a4ac906041feebc83873517591104ea68154fcea8678e90399a2ab0ef07cb8a06501b3586395c815e6d81150ed3a317f370f86fbf

    • C:\Users\Admin\AppData\Local\Temp\Hospital

      Filesize

      6KB

      MD5

      9b2c091f0b42ba119e5fa6bfd95e22d6

      SHA1

      38b7744c835a9d8856c38e19a06f1107249b5565

      SHA256

      e8301f7e0ff99dae0f724822ecefab61b4b21aeffc1c9c182bbb2b3d6f04e559

      SHA512

      cc14a3324acbf93deb6d670262d52f482ef91b071a312ab3d5ccc9ecd7f1772d7937a80f6092b64c300783108d18051b748934e5fa98b3b5ff15e1524708d6fa

    • C:\Users\Admin\AppData\Local\Temp\Hosting

      Filesize

      56KB

      MD5

      e7efd7a06af605e93ea0e0f6a768d7a9

      SHA1

      1ac31c4e79950111568d4ce73fcee387b865a415

      SHA256

      2eb51c59b8b67fcb580465afebdb7617a83266d8cd0bddd299c1f2a8c8550ed4

      SHA512

      42b2bae0a461a623e41daee3becba768802e879b36b438f4c31b0fb3d7654d0d953e5edfbc7b56fb61b1620a5fad606f002d8188ed6360b4709f859618700e2c

    • C:\Users\Admin\AppData\Local\Temp\Itsa

      Filesize

      94KB

      MD5

      051a14f480a1e08f6aea9bcb691d5e50

      SHA1

      808a2f6925953c3fe9c9c4d76596c958ebdbb6c8

      SHA256

      938ffc79927fb9634d508bd78ca49b5b45b733f7912034e0e2cef287ec3d3f91

      SHA512

      60476a137ac2c6bd7f3d130be063ff498b965e23f4cf497af64c048f14cf3d199fb997923c92e8a7b5a0516f65fc0e64c5ac149b092068fbdbf45983825ef028

    • C:\Users\Admin\AppData\Local\Temp\Major

      Filesize

      50KB

      MD5

      5cc9b184c9b717f867107896b1e1031b

      SHA1

      42896a978e3d0e31fba322fc4ea6739a1e45d7c7

      SHA256

      b1df5573ec0b1270a3907b03451a621b697df2cc059f488394fd212db4e8f302

      SHA512

      8a669c0af35695996db742d928ce7ed6496fbcd7a69301a550300504fad2f9aff63025e777d18ebc65ad5ca59e045b60e6c4fc6b47170482096137f9b4790004

    • C:\Users\Admin\AppData\Local\Temp\Pace

      Filesize

      62KB

      MD5

      0aa998ebfad36eb40ee5c8f673fdbaa8

      SHA1

      d5ce174dff8ae5a0ec25d9ace0e9ff5c7284990c

      SHA256

      2b2a31aafd7647c11bbe50fe3c23d9be3412639ddec00764764eb3f34b63cb8e

      SHA512

      1d460eb5500a82e0fd65e8e6eaaaafd73c3e86e0663ea93204fe8b6e8d84e4e998a6865683b52efea4339dbbb72d726971765835bed295a6c4efb8df7e1db29d

    • C:\Users\Admin\AppData\Local\Temp\Po

      Filesize

      93KB

      MD5

      02aee454c53ae3c3d86649c2bd57c944

      SHA1

      68a4ca87ca6429393ea4514958c799043c0f949a

      SHA256

      69bb3d3305f02fc996e13b741efea86d0f9b3f55789d9adcefd289cb52bb8d1a

      SHA512

      1ba108d5c9aea52c1647cbc33e75957455b235df4f871d7f3557f128827ad73bce54905b3a79ad0fc97367281bf4d42c7a8319dfa49744411c6b3759d11b5a65

    • C:\Users\Admin\AppData\Local\Temp\Proved

      Filesize

      50KB

      MD5

      ad1f2663aa0d3ff8a364cd9191875d6d

      SHA1

      be0bf7f7dada4ea98fdb1c79fddf85b41e09b8c9

      SHA256

      e6bfd3f87f7e209f00ab50107971872b5e10de6a8b0b2b71f49445460252f2ac

      SHA512

      0d5a57287a16f34d9559bdc8a4e005c1432ac73918efb5ff32f8ec960f00549764ee63e0a5b62112787e01efba05e6f125c1336998cf5df8372e3d157919011c

    • C:\Users\Admin\AppData\Local\Temp\Reaches

      Filesize

      76KB

      MD5

      443509b8ebc7249e01552436f8d7fb2c

      SHA1

      12890b0ca0b1cec196075ba820f88a7cb75250b2

      SHA256

      ec09b4bf30a7061383164afcc2c4aa41723e2f1644637e75736501046dad7248

      SHA512

      448e81cb11ac47f9b5b3589c7c392540b1591fa3209a80e1e1eac8027efebe250b9904ae43678b63ce7d2f2e68b4702a971b7cd8dfcc96813c7ff4cfdfe1bdc7

    • C:\Users\Admin\AppData\Local\Temp\Resolutions

      Filesize

      86KB

      MD5

      2af79301bb06ffb2a9b172002fa10322

      SHA1

      7f8f6d93a596d52b268ff485c1cdbbc8c11716ca

      SHA256

      6d60f1e883b792ea433a38563d081360067bd1c224a30dbe33751fc2a57bc68b

      SHA512

      0918afda33d5c1081e263f8a1d1da53d525f189533414adbd32749b2aad91ec4d6b134ee3574a1d20adfd93d05a2ac2dbb3c3ab21a5fb7729e5c44bc4bed0a9f

    • C:\Users\Admin\AppData\Local\Temp\Shares

      Filesize

      71KB

      MD5

      817c1e7ad55bc045b23a7fb2a61aa33d

      SHA1

      bb7a5bc2f6ad5aa3db6e7800c31e5556b3f419eb

      SHA256

      a053fd49caea2142a9a7b6a49f84e0a8a999b828fb4283d3065ac6e73823ec99

      SHA512

      97e559a2a118758688e0c228eeb598f6a57c6b75e7688c43f0c534daae18cec9fdff036651b3babcf169c4ba74cdaca7052b125d2e480fbd471e83fa80ba57ca

    • C:\Users\Admin\AppData\Local\Temp\Write

      Filesize

      98KB

      MD5

      ab810c64c650a6c031bfe9fdf2b9cc2e

      SHA1

      b25e8ff044ba006f9a448198abd52bf9d18c97d9

      SHA256

      f6c3ee3cc5c783a7ea177a3e6fd40fe80cba6fe0bebc648c10d17b6cde369129

      SHA512

      fbec8add7b367ed488f8a7727fa5099899bcbb1a15010a1517005de2ebf483ac9079b54a707a06bae91068f506917e6751ce27df21f191c56b7693db28708b6f

    • memory/860-52-0x0000000004B80000-0x0000000004C3A000-memory.dmp

      Filesize

      744KB

    • memory/860-53-0x0000000004CB0000-0x0000000004D16000-memory.dmp

      Filesize

      408KB

    • memory/860-49-0x0000000000700000-0x000000000075C000-memory.dmp

      Filesize

      368KB