Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
112s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 01:19
Static task
static1
Behavioral task
behavioral1
Sample
95602e66605d74f8ae3ee3cd62080c11f02e450df1eaa13a450781ad0345875bN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
95602e66605d74f8ae3ee3cd62080c11f02e450df1eaa13a450781ad0345875bN.exe
Resource
win10v2004-20240802-en
General
-
Target
95602e66605d74f8ae3ee3cd62080c11f02e450df1eaa13a450781ad0345875bN.exe
-
Size
203KB
-
MD5
e1bfd78da29f35c6343a579c1e8238a0
-
SHA1
708e572928f695741c7a4d8b7e9ebe4f35ed641e
-
SHA256
95602e66605d74f8ae3ee3cd62080c11f02e450df1eaa13a450781ad0345875b
-
SHA512
bbeb0f307c1405caf13f018b4f0f48a3547749f19a5069f14cca956d44eec2a187a5792b666f5158d3423af2bb8138fbe77f776d7763a0a21c59514e4bb81016
-
SSDEEP
3072:nchlUq90BGgKt/14Id5lM2kpHtDCJrqxRCNsOoBSlN/625ML71B:n6lUVBGgK91BWBlCZqxRkVoWNW7H
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts 95602e66605d74f8ae3ee3cd62080c11f02e450df1eaa13a450781ad0345875bN.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation 95602e66605d74f8ae3ee3cd62080c11f02e450df1eaa13a450781ad0345875bN.exe -
Executes dropped EXE 1 IoCs
pid Process 4204 dplaysvr.exe -
Loads dropped DLL 1 IoCs
pid Process 4204 dplaysvr.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\dplaysvr = "C:\\Users\\Admin\\AppData\\Local\\dplaysvr.exe" 95602e66605d74f8ae3ee3cd62080c11f02e450df1eaa13a450781ad0345875bN.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dplaysvr = "C:\\Users\\Admin\\AppData\\Local\\dplaysvr.exe" 95602e66605d74f8ae3ee3cd62080c11f02e450df1eaa13a450781ad0345875bN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 95602e66605d74f8ae3ee3cd62080c11f02e450df1eaa13a450781ad0345875bN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dplaysvr.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 95602e66605d74f8ae3ee3cd62080c11f02e450df1eaa13a450781ad0345875bN.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4204 dplaysvr.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4244 wrote to memory of 4204 4244 95602e66605d74f8ae3ee3cd62080c11f02e450df1eaa13a450781ad0345875bN.exe 83 PID 4244 wrote to memory of 4204 4244 95602e66605d74f8ae3ee3cd62080c11f02e450df1eaa13a450781ad0345875bN.exe 83 PID 4244 wrote to memory of 4204 4244 95602e66605d74f8ae3ee3cd62080c11f02e450df1eaa13a450781ad0345875bN.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\95602e66605d74f8ae3ee3cd62080c11f02e450df1eaa13a450781ad0345875bN.exe"C:\Users\Admin\AppData\Local\Temp\95602e66605d74f8ae3ee3cd62080c11f02e450df1eaa13a450781ad0345875bN.exe"1⤵
- Drops file in Drivers directory
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Users\Admin\AppData\Local\dplaysvr.exe"C:\Users\Admin\AppData\Local\dplaysvr.exe" C:\Users\Admin\AppData\Local\Temp\95602e66605d74f8ae3ee3cd62080c11f02e450df1eaa13a450781ad0345875bN.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4204
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}1⤵
- System Location Discovery: System Language Discovery
PID:3192
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
85KB
MD51176aa8559f6b635d2e1e8090ac97e68
SHA178ef7204fafedfade2d0d7f5785c782ae4089b07
SHA25604bd8000d103535516d8a5ef4a25b78918a2ed47ae5ed297b221995f6e7d468f
SHA51290a252b15ad5c8657100d510366df1a09bc1516ceea809e89237a9e3e1507895e565771b732ffcd1565d07b300f85df39069558231f1cc8f849753ca958e7958
-
Filesize
48KB
MD515cccfc50819f1c15b590569d919e206
SHA1611a5962fc12034b5bf6456b9916382ef96f51c2
SHA256663eee4846c459f4808389bf54ce167d4da74359d6bb96e00224528e4004603d
SHA512f93efbe0e9421ef4c222382f77d17f005b0010e42a34b36faecc5e6ca6512fcdd042a7fc27db1170507a6407504f9629a958e878e3ccb1d6d8c8782e5bffb4b9
-
Filesize
882B
MD5880a9b59be7eb9290f75b66616f0e7c0
SHA18672d534caa872b06c32d887f43f1a1bcec9d1cb
SHA256c049598c599d3c6a27a192d30ac62d4740069902c8d1c3f49283e9ed6ffa3df0
SHA512e0ee61d24df010bb41bfc3ee6c1032fe858addbea52f0e48b1a536025cb818fc28c14f2da0249315095f9357731333c7ce4f8abf9cbbc2279a0290c0f79ac03a