Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    91s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/10/2024, 08:51

General

  • Target

    NODKeygen.exe

  • Size

    603KB

  • MD5

    6b27da644353449db17f11c719d41faa

  • SHA1

    cb77bf1827298e3c1d6f990b6bcac2dbaaaf26d3

  • SHA256

    3984476ed5d3e9eb74667e766a1785800ffd78e0088608dd54950fa31460b2e0

  • SHA512

    3fd7c521e9f615675f7e70c4e39d794b537a7a48c15e74dd73abb14c309da66a1802574d588f26b94b9cc5e3c5ea390977346162ebcb0709045ffeb1eb41387f

  • SSDEEP

    12288:I47B6s5kmIpMvdznMoB+SbPDn1OHnrCxc9eDQbd4laK:7pesdMoB+GncgdsbiaK

Malware Config

Signatures

  • Boot or Logon Autostart Execution: Print Processors 1 TTPs 1 IoCs

    Adversaries may abuse print processors to run malicious DLLs during system boot for persistence and/or privilege escalation.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ NODKeygen.exe
    "C:\Users\Admin\AppData\Local\Temp\ NODKeygen.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4000
    • C:\Users\Admin\AppData\Local\Temp\NODKeygen.exe
      "C:\Users\Admin\AppData\Local\Temp\NODKeygen.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Drops file in System32 directory
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4576
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1796
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1796 CREDAT:17410 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:4880
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4584
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4584 CREDAT:17410 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1376
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2904
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2904 CREDAT:17410 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2908
    • C:\Users\Admin\AppData\Local\Temp\codec.exe
      "C:\Users\Admin\AppData\Local\Temp\codec.exe"
      2⤵
      • Boot or Logon Autostart Execution: Print Processors
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:3972

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    db7c83e09ebc4317f2bf2df7f66b8513

    SHA1

    29d58ef43f72ce7cf79ce6109d038a6c9b4873f0

    SHA256

    1ae4c8aa37bf433bc5b3b45e017c95bf843c7dbbe348c78c7ab6f3cad0fda4b8

    SHA512

    6eb46ae0c3e091ba13b1c0e3fb6de568882940df7968d0e1297568ea5356a4691f2a869c7c9ac9e9642bcc2e4e1388d00b15c663276143e8cb5015ab89c27867

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    30b9beecb38389b040937c5807e90116

    SHA1

    7b43a45bb9ec81eb0db1a170bd371f872df306d4

    SHA256

    4aaecbcd66715590eff67fc5e1b7dfd30689c20525cdde103ea9f1f4096555a0

    SHA512

    b0459b3fa91f0d58f9c876d1a2ca9bab9ce7b6025621c46462456e045f898faceb404502d169bbeaaa4e955b98e81f6f29674e6a824a31cdf341e6d7ae141279

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{EE4FA85E-822D-11EF-B1C5-C63D5579F9B2}.dat

    Filesize

    3KB

    MD5

    cdefc3360c4de5c763d400f24b92d6d0

    SHA1

    625edb14b64d67325563d6d3749ae29d1155b54b

    SHA256

    29a23a6446d2f2ce480e6d49f22a6d8bf0f487404119ff00dfcb01d9e0489b51

    SHA512

    f78e9e56a0b79182d25443465b25919976b5f90b907b46136d378660d8c3eb1290760a884aa31601c60161f393a9060bec1cf4b0d589909a3ccd5c1d56b88471

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{EE520A8D-822D-11EF-B1C5-C63D5579F9B2}.dat

    Filesize

    5KB

    MD5

    c57f867b884a4fed8623c4bd5201986b

    SHA1

    00fb79e63961178168e89928a5584c7e8963b28d

    SHA256

    53d6a377ef8296bf2ddcda0576f790f9aa690b4705f0b3ce93d0eff0037684c2

    SHA512

    82b2c1cf2a80b0406648f06910c88adb53f5a0576b0107b48db3033a94e88d2ec71d2d1858106ae221bee183f9e902aaf960ebe0f1e6b62e17c9ee645598bc04

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\VersionManager\ver3BAC.tmp

    Filesize

    15KB

    MD5

    1a545d0052b581fbb2ab4c52133846bc

    SHA1

    62f3266a9b9925cd6d98658b92adec673cbe3dd3

    SHA256

    557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1

    SHA512

    bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\IFM58U6K\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Temp\NODKeygen.exe

    Filesize

    486KB

    MD5

    a44286f286f9c8f435f0e4563666153d

    SHA1

    03d721dd42ba313abf42be5a6c64c163a821a294

    SHA256

    c0258988fcabc2a3df778a71dbbdcbd45eb0b0da3701167b275d7e14b7250e44

    SHA512

    5f9df337dd72d5988a7d5adea21b10b267402db3367dbf6a00f475fd5197f2e36204c04ffc8d93b883430ddf1d7f5c526e6635edf11519a0043252d5f8a507cb

  • C:\Users\Admin\AppData\Local\Temp\codec.exe

    Filesize

    63KB

    MD5

    ef85a8eda94d282d9e3c0f31f0fef956

    SHA1

    a2a5732d8750cbb1cec43b7ed528d25456107b7c

    SHA256

    7e1327dc7caf542c59e490555202c0aba8bd508d5a0a70e2808e577fe361dc85

    SHA512

    4fa5883f10ff0865213bb0bc1a58aa11f489586d81af36cbabfd88ecda297784d317becba933b4f9b30d9717766748e74a040802674a33e26f2ab33b7edf8a4c

  • memory/1796-31-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/2904-33-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/3972-30-0x00000000007D0000-0x0000000000850000-memory.dmp

    Filesize

    512KB

  • memory/3972-29-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/3972-25-0x00000000007D0000-0x0000000000850000-memory.dmp

    Filesize

    512KB

  • memory/4584-32-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB