Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/09/2024, 06:33
Behavioral task
behavioral1
Sample
69fd500012c0d3ab8427a6fd13fa2e50N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
69fd500012c0d3ab8427a6fd13fa2e50N.exe
Resource
win10v2004-20240802-en
General
-
Target
69fd500012c0d3ab8427a6fd13fa2e50N.exe
-
Size
110KB
-
MD5
69fd500012c0d3ab8427a6fd13fa2e50
-
SHA1
7abf3d3b642233f7a23b4c2727d50f3ba1f04225
-
SHA256
31c9b2982b13d7d493376272984ccb0f6449a1ad6f22f47efca058a4ae200fc4
-
SHA512
1fca0d07329904d11340b81ff15efd5b30624065f46b9686d20f883e95a7c054b2154434b10a98bb472b380d569243f250887bd46f6bb6afbaa461b633d23165
-
SSDEEP
1536:WUDofByDJWbMGcEJSmMR2EBKOJUsy1+VMAZ:7ofBHbKOg2OPvMA
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation 69fd500012c0d3ab8427a6fd13fa2e50N.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation explorer.exe -
Executes dropped EXE 4 IoCs
pid Process 4260 explorer.exe 4256 explorer.exe 4436 explorer.exe 2928 explorer.exe -
resource yara_rule behavioral2/memory/1340-0-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/4044-17-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4044-19-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/1340-20-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/4044-22-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/files/0x000700000001e55a-38.dat upx behavioral2/memory/4260-45-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/4260-49-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/4260-50-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/4260-54-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/4044-63-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4260-66-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/4044-69-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4256-99-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Video Driver = "C:\\Users\\Admin\\AppData\\Roaming\\config\\explorer.exe" reg.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1340 set thread context of 4044 1340 69fd500012c0d3ab8427a6fd13fa2e50N.exe 86 PID 4260 set thread context of 4256 4260 explorer.exe 96 PID 4260 set thread context of 4436 4260 explorer.exe 97 PID 4436 set thread context of 2928 4436 explorer.exe 98 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 69fd500012c0d3ab8427a6fd13fa2e50N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 69fd500012c0d3ab8427a6fd13fa2e50N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4256 explorer.exe Token: SeDebugPrivilege 4256 explorer.exe Token: SeDebugPrivilege 4256 explorer.exe Token: SeDebugPrivilege 4256 explorer.exe Token: SeDebugPrivilege 4256 explorer.exe Token: SeDebugPrivilege 4256 explorer.exe Token: SeDebugPrivilege 4256 explorer.exe Token: SeDebugPrivilege 4256 explorer.exe Token: SeDebugPrivilege 4256 explorer.exe Token: SeDebugPrivilege 4256 explorer.exe Token: SeDebugPrivilege 4256 explorer.exe Token: SeDebugPrivilege 4256 explorer.exe Token: SeDebugPrivilege 4256 explorer.exe Token: SeDebugPrivilege 4256 explorer.exe Token: SeDebugPrivilege 4256 explorer.exe Token: SeDebugPrivilege 4256 explorer.exe Token: SeDebugPrivilege 4256 explorer.exe Token: SeDebugPrivilege 4256 explorer.exe Token: SeDebugPrivilege 4256 explorer.exe Token: SeDebugPrivilege 4256 explorer.exe Token: SeDebugPrivilege 4256 explorer.exe Token: SeDebugPrivilege 4256 explorer.exe Token: SeDebugPrivilege 4256 explorer.exe Token: SeDebugPrivilege 4256 explorer.exe Token: SeDebugPrivilege 4256 explorer.exe Token: SeDebugPrivilege 4256 explorer.exe Token: SeDebugPrivilege 4256 explorer.exe Token: SeDebugPrivilege 4256 explorer.exe Token: SeDebugPrivilege 4256 explorer.exe Token: SeDebugPrivilege 4256 explorer.exe Token: SeDebugPrivilege 4256 explorer.exe Token: SeDebugPrivilege 4256 explorer.exe Token: SeDebugPrivilege 4256 explorer.exe Token: SeDebugPrivilege 4256 explorer.exe Token: SeDebugPrivilege 4256 explorer.exe Token: SeDebugPrivilege 4256 explorer.exe Token: SeDebugPrivilege 4256 explorer.exe Token: SeDebugPrivilege 4256 explorer.exe Token: SeDebugPrivilege 4256 explorer.exe Token: SeDebugPrivilege 4256 explorer.exe Token: SeDebugPrivilege 4256 explorer.exe Token: SeDebugPrivilege 4256 explorer.exe Token: SeDebugPrivilege 4256 explorer.exe Token: SeDebugPrivilege 4256 explorer.exe Token: SeDebugPrivilege 4256 explorer.exe Token: SeDebugPrivilege 4256 explorer.exe Token: SeDebugPrivilege 4256 explorer.exe Token: SeDebugPrivilege 4256 explorer.exe Token: SeDebugPrivilege 4256 explorer.exe Token: SeDebugPrivilege 4256 explorer.exe Token: SeDebugPrivilege 4256 explorer.exe Token: SeDebugPrivilege 4256 explorer.exe Token: SeDebugPrivilege 4256 explorer.exe Token: SeDebugPrivilege 4256 explorer.exe Token: SeDebugPrivilege 4256 explorer.exe Token: SeDebugPrivilege 4256 explorer.exe Token: SeDebugPrivilege 4256 explorer.exe Token: SeDebugPrivilege 4256 explorer.exe Token: SeDebugPrivilege 4256 explorer.exe Token: SeDebugPrivilege 4256 explorer.exe Token: SeDebugPrivilege 4256 explorer.exe Token: SeDebugPrivilege 4256 explorer.exe Token: SeDebugPrivilege 4256 explorer.exe Token: SeDebugPrivilege 4256 explorer.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1340 69fd500012c0d3ab8427a6fd13fa2e50N.exe 4044 69fd500012c0d3ab8427a6fd13fa2e50N.exe 4260 explorer.exe 4256 explorer.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 1340 wrote to memory of 4044 1340 69fd500012c0d3ab8427a6fd13fa2e50N.exe 86 PID 1340 wrote to memory of 4044 1340 69fd500012c0d3ab8427a6fd13fa2e50N.exe 86 PID 1340 wrote to memory of 4044 1340 69fd500012c0d3ab8427a6fd13fa2e50N.exe 86 PID 1340 wrote to memory of 4044 1340 69fd500012c0d3ab8427a6fd13fa2e50N.exe 86 PID 1340 wrote to memory of 4044 1340 69fd500012c0d3ab8427a6fd13fa2e50N.exe 86 PID 1340 wrote to memory of 4044 1340 69fd500012c0d3ab8427a6fd13fa2e50N.exe 86 PID 1340 wrote to memory of 4044 1340 69fd500012c0d3ab8427a6fd13fa2e50N.exe 86 PID 1340 wrote to memory of 4044 1340 69fd500012c0d3ab8427a6fd13fa2e50N.exe 86 PID 4044 wrote to memory of 1848 4044 69fd500012c0d3ab8427a6fd13fa2e50N.exe 89 PID 4044 wrote to memory of 1848 4044 69fd500012c0d3ab8427a6fd13fa2e50N.exe 89 PID 4044 wrote to memory of 1848 4044 69fd500012c0d3ab8427a6fd13fa2e50N.exe 89 PID 1848 wrote to memory of 648 1848 cmd.exe 92 PID 1848 wrote to memory of 648 1848 cmd.exe 92 PID 1848 wrote to memory of 648 1848 cmd.exe 92 PID 4044 wrote to memory of 4260 4044 69fd500012c0d3ab8427a6fd13fa2e50N.exe 93 PID 4044 wrote to memory of 4260 4044 69fd500012c0d3ab8427a6fd13fa2e50N.exe 93 PID 4044 wrote to memory of 4260 4044 69fd500012c0d3ab8427a6fd13fa2e50N.exe 93 PID 4260 wrote to memory of 4256 4260 explorer.exe 96 PID 4260 wrote to memory of 4256 4260 explorer.exe 96 PID 4260 wrote to memory of 4256 4260 explorer.exe 96 PID 4260 wrote to memory of 4256 4260 explorer.exe 96 PID 4260 wrote to memory of 4256 4260 explorer.exe 96 PID 4260 wrote to memory of 4256 4260 explorer.exe 96 PID 4260 wrote to memory of 4256 4260 explorer.exe 96 PID 4260 wrote to memory of 4256 4260 explorer.exe 96 PID 4260 wrote to memory of 4436 4260 explorer.exe 97 PID 4260 wrote to memory of 4436 4260 explorer.exe 97 PID 4260 wrote to memory of 4436 4260 explorer.exe 97 PID 4260 wrote to memory of 4436 4260 explorer.exe 97 PID 4260 wrote to memory of 4436 4260 explorer.exe 97 PID 4260 wrote to memory of 4436 4260 explorer.exe 97 PID 4260 wrote to memory of 4436 4260 explorer.exe 97 PID 4436 wrote to memory of 2928 4436 explorer.exe 98 PID 4436 wrote to memory of 2928 4436 explorer.exe 98 PID 4436 wrote to memory of 2928 4436 explorer.exe 98 PID 4436 wrote to memory of 2928 4436 explorer.exe 98 PID 4436 wrote to memory of 2928 4436 explorer.exe 98 PID 4436 wrote to memory of 2928 4436 explorer.exe 98 PID 4436 wrote to memory of 2928 4436 explorer.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\69fd500012c0d3ab8427a6fd13fa2e50N.exe"C:\Users\Admin\AppData\Local\Temp\69fd500012c0d3ab8427a6fd13fa2e50N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Users\Admin\AppData\Local\Temp\69fd500012c0d3ab8427a6fd13fa2e50N.exe"C:\Users\Admin\AppData\Local\Temp\69fd500012c0d3ab8427a6fd13fa2e50N.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\HRYIF.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Video Driver" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\config\explorer.exe" /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:648
-
-
-
C:\Users\Admin\AppData\Roaming\config\explorer.exe"C:\Users\Admin\AppData\Roaming\config\explorer.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Users\Admin\AppData\Roaming\config\explorer.exe"C:\Users\Admin\AppData\Roaming\config\explorer.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4256
-
-
C:\Users\Admin\AppData\Roaming\config\explorer.exe"C:\Users\Admin\AppData\Roaming\config\explorer.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Users\Admin\AppData\Roaming\config\explorer.exe"C:\Users\Admin\AppData\Roaming\config\explorer.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2928
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
294B
MD575cca4cda029bcd6fe544ef102075930
SHA10d57faf97c930102763397918d41c5e4b7bf76fd
SHA256ad72c791fc4cdd556b09bbb3d26fdfaf6ec4ab76a56350ed249d5a61856eb78b
SHA5126da7b6ac6f0b788aa62b4c904e3e23275deab7a0d4de0e5526248aef79cb766050eb25dfef1cfca0888fd212bdac8dac9ef90d4dc5c55df4dd2d6aea0721e52e
-
Filesize
149B
MD5fc1798b7c7938454220fda837a76f354
SHA1b232912930b2bc24ff18bf7ecd58f872bbe01ea0
SHA2567f0a5917b5aca9c5beb153aad0ef95bf0aeafb83768da5b086c3f029ba42d7c8
SHA512d1abdd45a8e5d33893b9d19424174a07feed145d2e6b4be318ab5fde503f850579a4a101a010f30e16ecde2c7123f45357a8341214655321ee0f0097ca911331
-
Filesize
110KB
MD50ed12f80cca0b7eacef9f80babf055f4
SHA1d14f33e1b13cad9e39acf910c0944f23c05d6594
SHA2567d5d9688777dbd3fcf7dddef48f9ca78580572682cb79953026ccc0ddf0dd785
SHA512df1253b55c6b3f4b7c24cf2f4d69990c279ed2597d47c48598179dbd53b53ad23a89fd1988a5664b270564e988920ebf450db68b0ec73ae2ffe934469b084878