Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
111s -
max time network
115s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/09/2024, 07:45
Static task
static1
Behavioral task
behavioral1
Sample
04ba8792f41973e5003aeb41aeb0ad8d93d5487a493929c99c3be6fecdb955e7N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
04ba8792f41973e5003aeb41aeb0ad8d93d5487a493929c99c3be6fecdb955e7N.exe
Resource
win10v2004-20240802-en
General
-
Target
04ba8792f41973e5003aeb41aeb0ad8d93d5487a493929c99c3be6fecdb955e7N.exe
-
Size
1.3MB
-
MD5
558a94947a999e841e9be9fe91e0a5e0
-
SHA1
f1b51f088629412207359a41428fd3af0346b199
-
SHA256
04ba8792f41973e5003aeb41aeb0ad8d93d5487a493929c99c3be6fecdb955e7
-
SHA512
003e3361417e4e8417d1f57aacbaade7adba8157ef938bda51af3f0fa7b7de0f3dc85696f7c796049ea7fb115382160490c2c356f49aa81b67e01c1a5a34f7d4
-
SSDEEP
24576:0NjXZ5ZFw+JZjnEUdoZ5Rbh0FVG8WJLDTGMekF:0RZ5c+7jnr2ZbyFw8qLDTAkF
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation 04ba8792f41973e5003aeb41aeb0ad8d93d5487a493929c99c3be6fecdb955e7N.exe -
Executes dropped EXE 2 IoCs
pid Process 3956 dwm32.exe 4580 dwm32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 04ba8792f41973e5003aeb41aeb0ad8d93d5487a493929c99c3be6fecdb955e7N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dwm32.exe -
Modifies registry class 30 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\psdrv\shell 04ba8792f41973e5003aeb41aeb0ad8d93d5487a493929c99c3be6fecdb955e7N.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\psdrv\shell\runas\command\IsolatedCommand = "\"%1\" %*" 04ba8792f41973e5003aeb41aeb0ad8d93d5487a493929c99c3be6fecdb955e7N.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\.exe\shell\open 04ba8792f41973e5003aeb41aeb0ad8d93d5487a493929c99c3be6fecdb955e7N.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\.exe\shell\runas\command 04ba8792f41973e5003aeb41aeb0ad8d93d5487a493929c99c3be6fecdb955e7N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 04ba8792f41973e5003aeb41aeb0ad8d93d5487a493929c99c3be6fecdb955e7N.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\psdrv\DefaultIcon 04ba8792f41973e5003aeb41aeb0ad8d93d5487a493929c99c3be6fecdb955e7N.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\psdrv\shell\runas 04ba8792f41973e5003aeb41aeb0ad8d93d5487a493929c99c3be6fecdb955e7N.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\.exe\ = "psdrv" 04ba8792f41973e5003aeb41aeb0ad8d93d5487a493929c99c3be6fecdb955e7N.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\.exe\DefaultIcon 04ba8792f41973e5003aeb41aeb0ad8d93d5487a493929c99c3be6fecdb955e7N.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\psdrv\shell\runas\command 04ba8792f41973e5003aeb41aeb0ad8d93d5487a493929c99c3be6fecdb955e7N.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\.exe\Content-Type = "application/x-msdownload" 04ba8792f41973e5003aeb41aeb0ad8d93d5487a493929c99c3be6fecdb955e7N.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\psdrv\ = "Application" 04ba8792f41973e5003aeb41aeb0ad8d93d5487a493929c99c3be6fecdb955e7N.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\psdrv\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\DVX\\dwm32.exe\" /START \"%1\" %*" 04ba8792f41973e5003aeb41aeb0ad8d93d5487a493929c99c3be6fecdb955e7N.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\.exe\shell 04ba8792f41973e5003aeb41aeb0ad8d93d5487a493929c99c3be6fecdb955e7N.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\.exe\shell\runas 04ba8792f41973e5003aeb41aeb0ad8d93d5487a493929c99c3be6fecdb955e7N.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings 04ba8792f41973e5003aeb41aeb0ad8d93d5487a493929c99c3be6fecdb955e7N.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\psdrv 04ba8792f41973e5003aeb41aeb0ad8d93d5487a493929c99c3be6fecdb955e7N.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\.exe 04ba8792f41973e5003aeb41aeb0ad8d93d5487a493929c99c3be6fecdb955e7N.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\.exe\shell\open\command 04ba8792f41973e5003aeb41aeb0ad8d93d5487a493929c99c3be6fecdb955e7N.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" 04ba8792f41973e5003aeb41aeb0ad8d93d5487a493929c99c3be6fecdb955e7N.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\psdrv\shell\open\command\IsolatedCommand = "\"%1\" %*" 04ba8792f41973e5003aeb41aeb0ad8d93d5487a493929c99c3be6fecdb955e7N.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\DVX\\dwm32.exe\" /START \"%1\" %*" 04ba8792f41973e5003aeb41aeb0ad8d93d5487a493929c99c3be6fecdb955e7N.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\psdrv\DefaultIcon\ = "%1" 04ba8792f41973e5003aeb41aeb0ad8d93d5487a493929c99c3be6fecdb955e7N.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\psdrv\shell\open\command 04ba8792f41973e5003aeb41aeb0ad8d93d5487a493929c99c3be6fecdb955e7N.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\psdrv\shell\open 04ba8792f41973e5003aeb41aeb0ad8d93d5487a493929c99c3be6fecdb955e7N.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\psdrv\shell\runas\command\ = "\"%1\" %*" 04ba8792f41973e5003aeb41aeb0ad8d93d5487a493929c99c3be6fecdb955e7N.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\.exe\DefaultIcon\ = "%1" 04ba8792f41973e5003aeb41aeb0ad8d93d5487a493929c99c3be6fecdb955e7N.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" 04ba8792f41973e5003aeb41aeb0ad8d93d5487a493929c99c3be6fecdb955e7N.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\.exe\shell\runas\command\ = "\"%1\" %*" 04ba8792f41973e5003aeb41aeb0ad8d93d5487a493929c99c3be6fecdb955e7N.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\psdrv\Content-Type = "application/x-msdownload" 04ba8792f41973e5003aeb41aeb0ad8d93d5487a493929c99c3be6fecdb955e7N.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3956 dwm32.exe Token: 33 2336 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2336 AUDIODG.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3956 dwm32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3200 wrote to memory of 3956 3200 04ba8792f41973e5003aeb41aeb0ad8d93d5487a493929c99c3be6fecdb955e7N.exe 82 PID 3200 wrote to memory of 3956 3200 04ba8792f41973e5003aeb41aeb0ad8d93d5487a493929c99c3be6fecdb955e7N.exe 82 PID 3200 wrote to memory of 3956 3200 04ba8792f41973e5003aeb41aeb0ad8d93d5487a493929c99c3be6fecdb955e7N.exe 82 PID 3956 wrote to memory of 4580 3956 dwm32.exe 83 PID 3956 wrote to memory of 4580 3956 dwm32.exe 83 PID 3956 wrote to memory of 4580 3956 dwm32.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\04ba8792f41973e5003aeb41aeb0ad8d93d5487a493929c99c3be6fecdb955e7N.exe"C:\Users\Admin\AppData\Local\Temp\04ba8792f41973e5003aeb41aeb0ad8d93d5487a493929c99c3be6fecdb955e7N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3200 -
C:\Users\Admin\AppData\Roaming\Microsoft\DVX\dwm32.exe"C:\Users\Admin\AppData\Roaming\Microsoft\DVX\dwm32.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\DVX\dwm32.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Users\Admin\AppData\Roaming\Microsoft\DVX\dwm32.exe"C:\Users\Admin\AppData\Roaming\Microsoft\DVX\dwm32.exe"3⤵
- Executes dropped EXE
PID:4580
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4ac 0x44c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2336
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5e8ce5bea74b17d9d6f9a4b00f1376604
SHA106498b0513b6f69140614ec760a07e92f7c4d4f2
SHA2569d0e703c52e141d4f5e6571f80231f8ff144b90049d70c75698ef8b996d492ce
SHA512945d67d54dfa748b0c6eae61ab5cce3af956eaca79e7c31818706018a1762a3a9af1e1ff8802371187821ba7713432fb1d1a75801a30785624f1b4bcc1441d45