Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
108s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01/10/2024, 23:39
Behavioral task
behavioral1
Sample
13398c378fe9ec371e7e08f8b2372412e3900b54ce3d2361564c8bb6154a2a76N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
13398c378fe9ec371e7e08f8b2372412e3900b54ce3d2361564c8bb6154a2a76N.exe
Resource
win10v2004-20240802-en
General
-
Target
13398c378fe9ec371e7e08f8b2372412e3900b54ce3d2361564c8bb6154a2a76N.exe
-
Size
1.7MB
-
MD5
ef120979c171eba0bedab797ab827380
-
SHA1
84e2cebef703f1235cf88d5b0d7aef5c3dc1f513
-
SHA256
13398c378fe9ec371e7e08f8b2372412e3900b54ce3d2361564c8bb6154a2a76
-
SHA512
cf1028ba928586c3f3ea0ec374c0bbaf9a318ab09a94e15d2144360ae3566c170e16ecb4ea30015639a12e4db0d8383e9aaf7db3973672c335e4ddc78dded702
-
SSDEEP
12288:DZISeMFVhdL1XBvXxzGNABnwHdxkn7L1GzR1FYoxkM2N4JHUcTwoSB:VIW0rXi1GzRQo08i
Malware Config
Signatures
-
Modifies firewall policy service 3 TTPs 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\Windows Updater.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Windows Updater.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\Windows Update\winupdt.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Windows Update\\winupdt.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation 13398c378fe9ec371e7e08f8b2372412e3900b54ce3d2361564c8bb6154a2a76N.exe -
Executes dropped EXE 3 IoCs
pid Process 1504 winupdt.exe 1032 winupdt.exe 1236 winupdt.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Window Updates = "C:\\Users\\Admin\\AppData\\Roaming\\Windows Update\\winupdt.exe" reg.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1504 set thread context of 1032 1504 winupdt.exe 87 PID 1504 set thread context of 1236 1504 winupdt.exe 88 -
resource yara_rule behavioral2/memory/3944-0-0x0000000000400000-0x00000000005B3000-memory.dmp upx behavioral2/files/0x00070000000234c1-16.dat upx behavioral2/memory/3944-28-0x0000000000400000-0x00000000005B3000-memory.dmp upx behavioral2/memory/1032-34-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/1032-36-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/1032-31-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/1236-41-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/memory/1236-44-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/memory/1236-38-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/memory/1504-48-0x0000000000400000-0x00000000005B3000-memory.dmp upx behavioral2/memory/1032-51-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/1236-52-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/memory/1032-53-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/1032-55-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/1032-58-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/1032-60-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/1032-62-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/1032-65-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/1032-67-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/1032-69-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/1032-76-0x0000000000400000-0x000000000045C000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 13398c378fe9ec371e7e08f8b2372412e3900b54ce3d2361564c8bb6154a2a76N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry key 1 TTPs 4 IoCs
pid Process 3856 reg.exe 3284 reg.exe 3080 reg.exe 4032 reg.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: 1 1032 winupdt.exe Token: SeCreateTokenPrivilege 1032 winupdt.exe Token: SeAssignPrimaryTokenPrivilege 1032 winupdt.exe Token: SeLockMemoryPrivilege 1032 winupdt.exe Token: SeIncreaseQuotaPrivilege 1032 winupdt.exe Token: SeMachineAccountPrivilege 1032 winupdt.exe Token: SeTcbPrivilege 1032 winupdt.exe Token: SeSecurityPrivilege 1032 winupdt.exe Token: SeTakeOwnershipPrivilege 1032 winupdt.exe Token: SeLoadDriverPrivilege 1032 winupdt.exe Token: SeSystemProfilePrivilege 1032 winupdt.exe Token: SeSystemtimePrivilege 1032 winupdt.exe Token: SeProfSingleProcessPrivilege 1032 winupdt.exe Token: SeIncBasePriorityPrivilege 1032 winupdt.exe Token: SeCreatePagefilePrivilege 1032 winupdt.exe Token: SeCreatePermanentPrivilege 1032 winupdt.exe Token: SeBackupPrivilege 1032 winupdt.exe Token: SeRestorePrivilege 1032 winupdt.exe Token: SeShutdownPrivilege 1032 winupdt.exe Token: SeDebugPrivilege 1032 winupdt.exe Token: SeAuditPrivilege 1032 winupdt.exe Token: SeSystemEnvironmentPrivilege 1032 winupdt.exe Token: SeChangeNotifyPrivilege 1032 winupdt.exe Token: SeRemoteShutdownPrivilege 1032 winupdt.exe Token: SeUndockPrivilege 1032 winupdt.exe Token: SeSyncAgentPrivilege 1032 winupdt.exe Token: SeEnableDelegationPrivilege 1032 winupdt.exe Token: SeManageVolumePrivilege 1032 winupdt.exe Token: SeImpersonatePrivilege 1032 winupdt.exe Token: SeCreateGlobalPrivilege 1032 winupdt.exe Token: 31 1032 winupdt.exe Token: 32 1032 winupdt.exe Token: 33 1032 winupdt.exe Token: 34 1032 winupdt.exe Token: 35 1032 winupdt.exe Token: SeDebugPrivilege 1236 winupdt.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3944 13398c378fe9ec371e7e08f8b2372412e3900b54ce3d2361564c8bb6154a2a76N.exe 1504 winupdt.exe 1032 winupdt.exe 1032 winupdt.exe 1236 winupdt.exe 1032 winupdt.exe -
Suspicious use of WriteProcessMemory 49 IoCs
description pid Process procid_target PID 3944 wrote to memory of 2468 3944 13398c378fe9ec371e7e08f8b2372412e3900b54ce3d2361564c8bb6154a2a76N.exe 82 PID 3944 wrote to memory of 2468 3944 13398c378fe9ec371e7e08f8b2372412e3900b54ce3d2361564c8bb6154a2a76N.exe 82 PID 3944 wrote to memory of 2468 3944 13398c378fe9ec371e7e08f8b2372412e3900b54ce3d2361564c8bb6154a2a76N.exe 82 PID 2468 wrote to memory of 4496 2468 cmd.exe 85 PID 2468 wrote to memory of 4496 2468 cmd.exe 85 PID 2468 wrote to memory of 4496 2468 cmd.exe 85 PID 3944 wrote to memory of 1504 3944 13398c378fe9ec371e7e08f8b2372412e3900b54ce3d2361564c8bb6154a2a76N.exe 86 PID 3944 wrote to memory of 1504 3944 13398c378fe9ec371e7e08f8b2372412e3900b54ce3d2361564c8bb6154a2a76N.exe 86 PID 3944 wrote to memory of 1504 3944 13398c378fe9ec371e7e08f8b2372412e3900b54ce3d2361564c8bb6154a2a76N.exe 86 PID 1504 wrote to memory of 1032 1504 winupdt.exe 87 PID 1504 wrote to memory of 1032 1504 winupdt.exe 87 PID 1504 wrote to memory of 1032 1504 winupdt.exe 87 PID 1504 wrote to memory of 1032 1504 winupdt.exe 87 PID 1504 wrote to memory of 1032 1504 winupdt.exe 87 PID 1504 wrote to memory of 1032 1504 winupdt.exe 87 PID 1504 wrote to memory of 1032 1504 winupdt.exe 87 PID 1504 wrote to memory of 1032 1504 winupdt.exe 87 PID 1504 wrote to memory of 1236 1504 winupdt.exe 88 PID 1504 wrote to memory of 1236 1504 winupdt.exe 88 PID 1504 wrote to memory of 1236 1504 winupdt.exe 88 PID 1504 wrote to memory of 1236 1504 winupdt.exe 88 PID 1504 wrote to memory of 1236 1504 winupdt.exe 88 PID 1504 wrote to memory of 1236 1504 winupdt.exe 88 PID 1504 wrote to memory of 1236 1504 winupdt.exe 88 PID 1504 wrote to memory of 1236 1504 winupdt.exe 88 PID 1032 wrote to memory of 2532 1032 winupdt.exe 89 PID 1032 wrote to memory of 2532 1032 winupdt.exe 89 PID 1032 wrote to memory of 2532 1032 winupdt.exe 89 PID 1032 wrote to memory of 4540 1032 winupdt.exe 90 PID 1032 wrote to memory of 4540 1032 winupdt.exe 90 PID 1032 wrote to memory of 4540 1032 winupdt.exe 90 PID 1032 wrote to memory of 3860 1032 winupdt.exe 91 PID 1032 wrote to memory of 3860 1032 winupdt.exe 91 PID 1032 wrote to memory of 3860 1032 winupdt.exe 91 PID 1032 wrote to memory of 1244 1032 winupdt.exe 93 PID 1032 wrote to memory of 1244 1032 winupdt.exe 93 PID 1032 wrote to memory of 1244 1032 winupdt.exe 93 PID 2532 wrote to memory of 3284 2532 cmd.exe 97 PID 2532 wrote to memory of 3284 2532 cmd.exe 97 PID 2532 wrote to memory of 3284 2532 cmd.exe 97 PID 1244 wrote to memory of 3856 1244 cmd.exe 98 PID 1244 wrote to memory of 3856 1244 cmd.exe 98 PID 1244 wrote to memory of 3856 1244 cmd.exe 98 PID 3860 wrote to memory of 4032 3860 cmd.exe 99 PID 3860 wrote to memory of 4032 3860 cmd.exe 99 PID 3860 wrote to memory of 4032 3860 cmd.exe 99 PID 4540 wrote to memory of 3080 4540 cmd.exe 100 PID 4540 wrote to memory of 3080 4540 cmd.exe 100 PID 4540 wrote to memory of 3080 4540 cmd.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\13398c378fe9ec371e7e08f8b2372412e3900b54ce3d2361564c8bb6154a2a76N.exe"C:\Users\Admin\AppData\Local\Temp\13398c378fe9ec371e7e08f8b2372412e3900b54ce3d2361564c8bb6154a2a76N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\GBAxh.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Window Updates" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Windows Update\winupdt.exe" /f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4496
-
-
-
C:\Users\Admin\AppData\Roaming\Windows Update\winupdt.exe"C:\Users\Admin\AppData\Roaming\Windows Update\winupdt.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Users\Admin\AppData\Roaming\Windows Update\winupdt.exe"C:\Users\Admin\AppData\Roaming\Windows Update\winupdt.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3284
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Windows Update\winupdt.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Windows Update\winupdt.exe:*:Enabled:Windows Messanger" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Windows Update\winupdt.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Windows Update\winupdt.exe:*:Enabled:Windows Messanger" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3080
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3860 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4032
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Windows Updater.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Windows Updater.exe:*:Enabled:Windows Messanger" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Windows Updater.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Windows Updater.exe:*:Enabled:Windows Messanger" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3856
-
-
-
-
C:\Users\Admin\AppData\Roaming\Windows Update\winupdt.exe"C:\Users\Admin\AppData\Roaming\Windows Update\winupdt.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1236
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
158B
MD51954c7e666c5b4d1117ef07bc0c9b8ec
SHA1559e3c0273c1463e9184027b749bdaad0a372681
SHA25635e0dbc8b455ca38976157ce9d0293fd6cdca20f46f1cb69058a1e0f0af6f693
SHA5123939de8d0ab7e67b59ff8bebed5580dafd38d8785193fd42a289728500761a68b9e6660605e19e10d4278dd106fea4b273a208f25485e7389c8f19b2958c926a
-
Filesize
1.7MB
MD5af33e689eb4fa92bb0c40dd02fa64aaa
SHA1530d81c49f17727f6ed529673611bb4186857d2b
SHA256cbcd533775e126aa5c4403d2bbb76a9dfac310242678333e5cbc6fad52588e3e
SHA51260ef00d814e3864f20069acefc17a301abda9c41af354a142c9e5a011d7443e6e7f79098b0a656d1c8c343f102e1cc134519b537ae8a49595eb08c946670117d