Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    119s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/09/2024, 12:39

General

  • Target

    1ffc5e27d5aca993bb3426c576e15499eb85bc16acb94c3755b456839e5b34c9N.exe

  • Size

    234KB

  • MD5

    f2c86894eaf1eb32a0504c7540220290

  • SHA1

    aec00cfdacc0f0f8ae8d3cdb8dda61fb87245e3a

  • SHA256

    1ffc5e27d5aca993bb3426c576e15499eb85bc16acb94c3755b456839e5b34c9

  • SHA512

    55c31a3953d4d4c277daebbdf61ed4f555e5631946ec57abec0914464404e2685cd6ccf09230a6f3d038614ee653e7a4ebf735ef7686abfc06ace0a45b22a41c

  • SSDEEP

    3072:h5xP/oznBDojDW2tozrwy6CB3bBLdK7SAI9ud8Qq2sNNIOzpfH9S6jlRDNNAXFk+:hr5XRouCB3hd62uyQq2sR5dn5NIFk+

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of UnmapMainImage
    PID:3540
    • C:\Users\Admin\AppData\Local\Temp\1ffc5e27d5aca993bb3426c576e15499eb85bc16acb94c3755b456839e5b34c9N.exe
      "C:\Users\Admin\AppData\Local\Temp\1ffc5e27d5aca993bb3426c576e15499eb85bc16acb94c3755b456839e5b34c9N.exe"
      2⤵
      • Adds Run key to start application
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4112
      • C:\Users\Admin\AppData\Roaming\MRINdiag\MRINywiz.exe
        "C:\Users\Admin\AppData\Roaming\MRINdiag"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4864
        • C:\Users\Admin\AppData\Local\Temp\~58D9.tmp
          3540 239624 4864 1
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:440
  • C:\Windows\SysWOW64\eudctvwr.exe
    C:\Windows\SysWOW64\eudctvwr.exe -s
    1⤵
    • Executes dropped EXE
    • System Location Discovery: System Language Discovery
    PID:1540
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4380,i,11251706013556949551,5157034131170452377,262144 --variations-seed-version --mojo-platform-channel-handle=4188 /prefetch:8
    1⤵
      PID:872

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\~58D9.tmp

      Filesize

      8KB

      MD5

      86dc243576cf5c7445451af37631eea9

      SHA1

      99a81c47c4c02f32c0ab456bfa23c306c7a09bf9

      SHA256

      25d2a671e1b5b5b95697ac0234ce4d46e0d0894919521b54aabebd9daecf994a

      SHA512

      c7310524f9b65f811146c1eb6ae944966351ac88a95fbc1ac422d8810730e5e212a7e28090ad758ea23c96ba38073e7fcf42460575e7f09dbc759a45c5d5a4a4

    • C:\Users\Admin\AppData\Roaming\MRINdiag\MRINywiz.exe

      Filesize

      234KB

      MD5

      59dce94f7aae63ac82d3532f08e32264

      SHA1

      91d50a1a6ea643d3a9aefe803022fb5357b5907d

      SHA256

      391482ab8c5fca0438b4c4a7af010cce10ca295d0a998ad410dd17886d16db2e

      SHA512

      ca7c538ba6a3ceb733a2fd9c4a79bd330bfd6108a5387f34abbca82866723a36dd7b781467e6d8ac92aadbca3c8110baf1f2aaeafabef99940c902b3f47111d3

    • memory/1540-13-0x0000000000510000-0x0000000000553000-memory.dmp

      Filesize

      268KB

    • memory/1540-14-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/3540-22-0x0000000003420000-0x000000000346A000-memory.dmp

      Filesize

      296KB

    • memory/3540-24-0x0000000001690000-0x0000000001696000-memory.dmp

      Filesize

      24KB

    • memory/3540-28-0x0000000001730000-0x000000000173D000-memory.dmp

      Filesize

      52KB

    • memory/3540-19-0x0000000003420000-0x000000000346A000-memory.dmp

      Filesize

      296KB

    • memory/4112-1-0x0000000000560000-0x00000000005A3000-memory.dmp

      Filesize

      268KB

    • memory/4112-0-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/4112-18-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/4864-6-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/4864-11-0x0000000000510000-0x0000000000553000-memory.dmp

      Filesize

      268KB

    • memory/4864-12-0x00000000006D0000-0x00000000006D5000-memory.dmp

      Filesize

      20KB

    • memory/4864-29-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB