Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
95s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/09/2024, 14:08
Static task
static1
Behavioral task
behavioral1
Sample
0f4c83a80e28fda7257eb5d6357b9890N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0f4c83a80e28fda7257eb5d6357b9890N.exe
Resource
win10v2004-20240802-en
General
-
Target
0f4c83a80e28fda7257eb5d6357b9890N.exe
-
Size
280KB
-
MD5
0f4c83a80e28fda7257eb5d6357b9890
-
SHA1
5ac8b3d61d216ee5869d9a0f5312122b66100cee
-
SHA256
ce5353f0fff1f1e50d5456b1f716fa0796d9dbb0565591fecee47da523fc65f4
-
SHA512
0f9e14d23e27ba991eb1f5b4176d8788c555888e07e71f39fc07f0590602e2adc6ecb9bd88c088bed63b246304760ca197220421018f4beab8b468e4b2217b1b
-
SSDEEP
6144:uTz+WrPFZvTXb4RyW42vFlOloh2E+7pYUozDK:uTBPFV0RyWl3h2E+7pl
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation 0f4c83a80e28fda7257eb5d6357b9890N.exe -
Executes dropped EXE 2 IoCs
pid Process 1788 taskhostsys.exe 3972 taskhostsys.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0f4c83a80e28fda7257eb5d6357b9890N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskhostsys.exe -
Modifies registry class 30 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\jitc\DefaultIcon\ = "%1" 0f4c83a80e28fda7257eb5d6357b9890N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\jitc\shell\open\command\IsolatedCommand = "\"%1\" %*" 0f4c83a80e28fda7257eb5d6357b9890N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\.exe\ = "jitc" 0f4c83a80e28fda7257eb5d6357b9890N.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\Local Settings 0f4c83a80e28fda7257eb5d6357b9890N.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\jitc\shell 0f4c83a80e28fda7257eb5d6357b9890N.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\.exe 0f4c83a80e28fda7257eb5d6357b9890N.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\.exe\DefaultIcon 0f4c83a80e28fda7257eb5d6357b9890N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 0f4c83a80e28fda7257eb5d6357b9890N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\jitc\shell\runas\command\IsolatedCommand = "\"%1\" %*" 0f4c83a80e28fda7257eb5d6357b9890N.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\.exe\shell\open 0f4c83a80e28fda7257eb5d6357b9890N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\.exe\Content-Type = "application/x-msdownload" 0f4c83a80e28fda7257eb5d6357b9890N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" 0f4c83a80e28fda7257eb5d6357b9890N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\.exe\shell\runas\command\ = "\"%1\" %*" 0f4c83a80e28fda7257eb5d6357b9890N.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\jitc\DefaultIcon 0f4c83a80e28fda7257eb5d6357b9890N.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\jitc\shell\runas 0f4c83a80e28fda7257eb5d6357b9890N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\.exe\DefaultIcon\ = "%1" 0f4c83a80e28fda7257eb5d6357b9890N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" 0f4c83a80e28fda7257eb5d6357b9890N.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\.exe\shell\runas\command 0f4c83a80e28fda7257eb5d6357b9890N.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\jitc 0f4c83a80e28fda7257eb5d6357b9890N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\jitc\ = "Application" 0f4c83a80e28fda7257eb5d6357b9890N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\jitc\Content-Type = "application/x-msdownload" 0f4c83a80e28fda7257eb5d6357b9890N.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\jitc\shell\open\command 0f4c83a80e28fda7257eb5d6357b9890N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\jitc\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Sys32\\taskhostsys.exe\" /START \"%1\" %*" 0f4c83a80e28fda7257eb5d6357b9890N.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\.exe\shell\runas 0f4c83a80e28fda7257eb5d6357b9890N.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\jitc\shell\open 0f4c83a80e28fda7257eb5d6357b9890N.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\jitc\shell\runas\command 0f4c83a80e28fda7257eb5d6357b9890N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\jitc\shell\runas\command\ = "\"%1\" %*" 0f4c83a80e28fda7257eb5d6357b9890N.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\.exe\shell 0f4c83a80e28fda7257eb5d6357b9890N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Sys32\\taskhostsys.exe\" /START \"%1\" %*" 0f4c83a80e28fda7257eb5d6357b9890N.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\.exe\shell\open\command 0f4c83a80e28fda7257eb5d6357b9890N.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1788 taskhostsys.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 400 wrote to memory of 1788 400 0f4c83a80e28fda7257eb5d6357b9890N.exe 86 PID 400 wrote to memory of 1788 400 0f4c83a80e28fda7257eb5d6357b9890N.exe 86 PID 400 wrote to memory of 1788 400 0f4c83a80e28fda7257eb5d6357b9890N.exe 86 PID 1788 wrote to memory of 3972 1788 taskhostsys.exe 87 PID 1788 wrote to memory of 3972 1788 taskhostsys.exe 87 PID 1788 wrote to memory of 3972 1788 taskhostsys.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f4c83a80e28fda7257eb5d6357b9890N.exe"C:\Users\Admin\AppData\Local\Temp\0f4c83a80e28fda7257eb5d6357b9890N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Users\Admin\AppData\Roaming\Microsoft\Sys32\taskhostsys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Sys32\taskhostsys.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\Sys32\taskhostsys.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Users\Admin\AppData\Roaming\Microsoft\Sys32\taskhostsys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Sys32\taskhostsys.exe"3⤵
- Executes dropped EXE
PID:3972
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280KB
MD59d0c5c0db70fc1d933e1392cc2d6543d
SHA1913fa260b58fd0b0de0a947c5206d2e728fc1546
SHA256f3e0c663d55cd4eee246cb5632484b1012a7edd39d3a8f95669ca8a6fc925611
SHA512f3d6af5ba82cfa35e9601cecec79e1071b7344b2ebb822eaba43ac3ed46725b2fce0b928b199771e95aa2fb741e4fd88cf56c782ae8ef62f2cc7ddd01b243265