Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    95s
  • max time network
    131s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/09/2024, 17:00

General

  • Target

    2024-09-27_456fa0e3c8dac4b0601aae86f24183ea_avoslocker.exe

  • Size

    2.0MB

  • MD5

    456fa0e3c8dac4b0601aae86f24183ea

  • SHA1

    b818914aaf00c6817169cfc30f37812b807013e2

  • SHA256

    6365be55d95a945a7d126efc1ab301fde9821c799b68a7f957b18fb6c68b118c

  • SHA512

    542c28798bf1ca234be2eef5d0fac7138b0baf037b65452abbc6570d3d910b79c4891197328b8fb927bb82c6eb29f42f08f0fcb79caf8c805493b1b6fd09cdd7

  • SSDEEP

    49152:lencs7Qc0FK79/Ves7FozshjPHYnsABxi4Dmg27RnWGj:lency/Ves7WwhjPGD527BWG

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-09-27_456fa0e3c8dac4b0601aae86f24183ea_avoslocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-09-27_456fa0e3c8dac4b0601aae86f24183ea_avoslocker.exe"
    1⤵
    • Checks computer location settings
    • Checks whether UAC is enabled
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Modifies system certificate store
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:228
    • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Reader_sl.exe
      "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Reader_sl.exe"
      2⤵
        PID:2124

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\Adobe\ARM\{291AA914-A987-4CE9-BD63-AC0A92D435E5}\RdrManifest2.msi

      Filesize

      14KB

      MD5

      0162a7a6ca55dd442e64f02c36187314

      SHA1

      24392ff794633445f4fe12a8a422046d24d67482

      SHA256

      5aa41c7e3160dca492317182e2cf5ad947e91457b5d4a39fc5d7aabcc0c9dd8c

      SHA512

      36e1fa17e868670b433206734fe028ce6b05dc3c6266c557342152fb3cb1984455fe6a9345c877eff394bf6959c6130a861ce7f30004d23c4a580227256a6332

    • C:\Users\Admin\AppData\Local\Temp\ReportUpdaterPolicy3672.txt

      Filesize

      4B

      MD5

      455831477b82574f6bf871193f2f761d

      SHA1

      f44217a81173869e08671753c52553646ff5d95b

      SHA256

      69bf0bc46f51b33377c4f3d92caf876714f6bbbe99e7544487327920873f9820

      SHA512

      cbc0ee58e447428bdcf72fc8b03c8cfb086edbb14205b918e75ebeff1d85ff1dd254e9dcb387afbd3fa766c803937c306e0a2a79870c0d87abcb7ab93661cf85

    • C:\Users\Admin\AppData\Local\Temp\TmpABC1.tmp

      Filesize

      5KB

      MD5

      590f0b893183a18322bb52632a7540eb

      SHA1

      0f7afb477bc8694f775b9d2b9d35f8c1e3c9e127

      SHA256

      66d5c55eb3662a2084ba3bdbacde986fb4bc52c4a5f23b4590bfa08a3ee13788

      SHA512

      11c5370921149fe3d45e6f3072e5a55ff87eb819ca2e70dd3c54c2c6d54c3f0285e6838d2ddc6580858819e03117e226ebe8c1200e2b275fae84f064eb4162ab

    • C:\Users\Admin\AppData\Local\Temp\TmpC8C0.tmp

      Filesize

      5KB

      MD5

      5db0f39788f404c09fb17c3486a00976

      SHA1

      8776e275612490445d2213e572795b60c7abdcaf

      SHA256

      699406274826aeb8e1fb1083b8c85e8ca2deb283d9c9070eed9317cea54020e3

      SHA512

      7d1a660aa72dc18370d2765ff25201bf07a2e5d2ff29c6a6f0230922908b5a7404ccf237d2ca17683be713e8a2b8b91898eaaa808f2f6814ce98d1de59357699

    • C:\Users\Admin\AppData\Local\Temp\TmpC96D.tmp

      Filesize

      3KB

      MD5

      fc2430057cb1be74c788f10c2d4540c8

      SHA1

      cab67ee8d5191fbf9f25545825e06c1a822af2f2

      SHA256

      dcc9d2695125406282ba990fec39403c44b12964acf51b5e0dc7f2080d714398

      SHA512

      4e2b9709a9e3ca5173abb35816e5a0aebbf2a7aaf971d7f75f3ae66e4a812cbade103baa5016525f5ab83a60c18f8d3c278c90ff83e4afdae419f81673cb5aee

    • C:\Users\Admin\AppData\Local\Temp\TmpD035.tmp

      Filesize

      3KB

      MD5

      a58599260c64cb41ed7d156db8ac13ef

      SHA1

      fb9396eb1270e9331456a646ebf1419fc283dc06

      SHA256

      aabf92089e16fdb28706356dbc4efb5a81f5277946f2e67695b31676616ed2d2

      SHA512

      6970cbc42e7ec64ccdb8e5633b7017b1e9ec0d4ad094869e221e9275b814b1442b84827996190159543bdb5e86df6885c45197c533d657db4660fca8ad761a71

    • C:\Windows\Temp\ArmReport.ini

      Filesize

      472B

      MD5

      150650f8b4ce06bf6720a55c29275c38

      SHA1

      c69a908cd7138d119f38c8db07031364b1d21388

      SHA256

      9d7407b8bcd4af6820eae7da00db7598246d0f58dc502ef3c89aacbd9cc8a104

      SHA512

      fcfb7f30078c6e1c43cf272b96b5fbd599fb6ea694cbb79a7a3e40de0eea9e031a4b67d1c2f348d3ab19760b48b67758fd7b4ddd921aab9f3e8d3a064c662bd4

    • C:\Windows\Temp\ArmReport.ini

      Filesize

      724B

      MD5

      9d62d227564196c844e892bf220a1298

      SHA1

      444b2371426b3ef7bc372aa40cc96b2428f29e8d

      SHA256

      75c515a974331642bba2005b0d0764cde29ffd6ac526a700e27b9de049c0c6bc

      SHA512

      b421783afc5d58727b8949f3a8db3e361047d99e9248ebdecd13bf60e0e0606dba6d6f6e293d2cc165b2bf0e793ec1076fd204a0d6b73699fdcb0f2bbf9a3e1c

    • C:\Windows\Temp\ArmReport.ini

      Filesize

      762B

      MD5

      77fecba2e448ebb5cc660ec5f94ccc4c

      SHA1

      5e09f9f76c75bb8f43a40caca105f1ba6388079f

      SHA256

      7403a5ed0c85bcb5ce1fe104bd05fcabe10fc978bb6963392222c06b2803cc98

      SHA512

      b8da5c9cd3ca889d96793c08ceb5ffa3f9064f790a143a5d4535512878e8db922a3055809c4fcb640008b9dec0e1233adae075d2a9f7320b9ab1e9b880ad625b

    • C:\Windows\Temp\ArmUI.ini

      Filesize

      234KB

      MD5

      cd12a965da4fb66e7f8a07e3f421196c

      SHA1

      f6377f231362acbd1063aff829ced283a2660b89

      SHA256

      790b06745f32e0f56a7af24c871ffce225ba05ebf0d8f8a71a00c727c97dcf09

      SHA512

      3fa242c3f573c706e0f36b477ce03f47d9ba0712ef72b94eae4f426dfe21ebbaf1dbebb0981335970b5186d416b4d25e175773796486f39e17de1df0a68a9b0d

    • memory/228-122-0x0000000000400000-0x0000000000612000-memory.dmp

      Filesize

      2.1MB

    • memory/228-0-0x0000000000400000-0x0000000000612000-memory.dmp

      Filesize

      2.1MB

    • memory/228-296-0x0000000000400000-0x0000000000612000-memory.dmp

      Filesize

      2.1MB