Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
92s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/10/2024, 14:03
Static task
static1
Behavioral task
behavioral1
Sample
1e716acec0f8c78445db489b74b7c3ff027181e332377773f11530a7669f9693.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1e716acec0f8c78445db489b74b7c3ff027181e332377773f11530a7669f9693.exe
Resource
win10v2004-20240802-en
General
-
Target
1e716acec0f8c78445db489b74b7c3ff027181e332377773f11530a7669f9693.exe
-
Size
4.4MB
-
MD5
dc80f69d4858ddf6895dcac9522a1943
-
SHA1
317d13edcc00528cae9c4fcc353d8d640a5d89a3
-
SHA256
1e716acec0f8c78445db489b74b7c3ff027181e332377773f11530a7669f9693
-
SHA512
21d4a8a4a962bad2aef43d3b8c3f25f16be30829139990076502e93bf4788949d47912e71be80c4ee72a6edd1ffe393efda38813650c6faf6709738a28475352
-
SSDEEP
49152:tD7tbFza8IBn2cpi7cSgWVh07Z2GBc024xF6QKRaTzBbW5ur7S3cx4B1TqBv7i:hxbMB2kZ2rUF6QKRybL7S
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\VideoGpuEditor = "C:\\Users\\Admin\\Music\\VideoGpuUpdater\\GpuVideoOculus.exe" 1e716acec0f8c78445db489b74b7c3ff027181e332377773f11530a7669f9693.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 4116 tasklist.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1e716acec0f8c78445db489b74b7c3ff027181e332377773f11530a7669f9693.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WMIC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1e716acec0f8c78445db489b74b7c3ff027181e332377773f11530a7669f9693.exe -
Suspicious use of AdjustPrivilegeToken 43 IoCs
description pid Process Token: SeDebugPrivilege 4116 tasklist.exe Token: SeIncreaseQuotaPrivilege 3024 WMIC.exe Token: SeSecurityPrivilege 3024 WMIC.exe Token: SeTakeOwnershipPrivilege 3024 WMIC.exe Token: SeLoadDriverPrivilege 3024 WMIC.exe Token: SeSystemProfilePrivilege 3024 WMIC.exe Token: SeSystemtimePrivilege 3024 WMIC.exe Token: SeProfSingleProcessPrivilege 3024 WMIC.exe Token: SeIncBasePriorityPrivilege 3024 WMIC.exe Token: SeCreatePagefilePrivilege 3024 WMIC.exe Token: SeBackupPrivilege 3024 WMIC.exe Token: SeRestorePrivilege 3024 WMIC.exe Token: SeShutdownPrivilege 3024 WMIC.exe Token: SeDebugPrivilege 3024 WMIC.exe Token: SeSystemEnvironmentPrivilege 3024 WMIC.exe Token: SeRemoteShutdownPrivilege 3024 WMIC.exe Token: SeUndockPrivilege 3024 WMIC.exe Token: SeManageVolumePrivilege 3024 WMIC.exe Token: 33 3024 WMIC.exe Token: 34 3024 WMIC.exe Token: 35 3024 WMIC.exe Token: 36 3024 WMIC.exe Token: SeIncreaseQuotaPrivilege 3024 WMIC.exe Token: SeSecurityPrivilege 3024 WMIC.exe Token: SeTakeOwnershipPrivilege 3024 WMIC.exe Token: SeLoadDriverPrivilege 3024 WMIC.exe Token: SeSystemProfilePrivilege 3024 WMIC.exe Token: SeSystemtimePrivilege 3024 WMIC.exe Token: SeProfSingleProcessPrivilege 3024 WMIC.exe Token: SeIncBasePriorityPrivilege 3024 WMIC.exe Token: SeCreatePagefilePrivilege 3024 WMIC.exe Token: SeBackupPrivilege 3024 WMIC.exe Token: SeRestorePrivilege 3024 WMIC.exe Token: SeShutdownPrivilege 3024 WMIC.exe Token: SeDebugPrivilege 3024 WMIC.exe Token: SeSystemEnvironmentPrivilege 3024 WMIC.exe Token: SeRemoteShutdownPrivilege 3024 WMIC.exe Token: SeUndockPrivilege 3024 WMIC.exe Token: SeManageVolumePrivilege 3024 WMIC.exe Token: 33 3024 WMIC.exe Token: 34 3024 WMIC.exe Token: 35 3024 WMIC.exe Token: 36 3024 WMIC.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4180 wrote to memory of 1132 4180 1e716acec0f8c78445db489b74b7c3ff027181e332377773f11530a7669f9693.exe 86 PID 4180 wrote to memory of 1132 4180 1e716acec0f8c78445db489b74b7c3ff027181e332377773f11530a7669f9693.exe 86 PID 4180 wrote to memory of 1132 4180 1e716acec0f8c78445db489b74b7c3ff027181e332377773f11530a7669f9693.exe 86 PID 4180 wrote to memory of 1132 4180 1e716acec0f8c78445db489b74b7c3ff027181e332377773f11530a7669f9693.exe 86 PID 4180 wrote to memory of 1132 4180 1e716acec0f8c78445db489b74b7c3ff027181e332377773f11530a7669f9693.exe 86 PID 1132 wrote to memory of 4440 1132 1e716acec0f8c78445db489b74b7c3ff027181e332377773f11530a7669f9693.exe 87 PID 1132 wrote to memory of 4440 1132 1e716acec0f8c78445db489b74b7c3ff027181e332377773f11530a7669f9693.exe 87 PID 1132 wrote to memory of 4440 1132 1e716acec0f8c78445db489b74b7c3ff027181e332377773f11530a7669f9693.exe 87 PID 4440 wrote to memory of 4116 4440 cmd.exe 90 PID 4440 wrote to memory of 4116 4440 cmd.exe 90 PID 4440 wrote to memory of 4116 4440 cmd.exe 90 PID 1132 wrote to memory of 1004 1132 1e716acec0f8c78445db489b74b7c3ff027181e332377773f11530a7669f9693.exe 91 PID 1132 wrote to memory of 1004 1132 1e716acec0f8c78445db489b74b7c3ff027181e332377773f11530a7669f9693.exe 91 PID 1132 wrote to memory of 1004 1132 1e716acec0f8c78445db489b74b7c3ff027181e332377773f11530a7669f9693.exe 91 PID 1004 wrote to memory of 3024 1004 cmd.exe 93 PID 1004 wrote to memory of 3024 1004 cmd.exe 93 PID 1004 wrote to memory of 3024 1004 cmd.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e716acec0f8c78445db489b74b7c3ff027181e332377773f11530a7669f9693.exe"C:\Users\Admin\AppData\Local\Temp\1e716acec0f8c78445db489b74b7c3ff027181e332377773f11530a7669f9693.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Users\Admin\AppData\Local\Temp\1e716acec0f8c78445db489b74b7c3ff027181e332377773f11530a7669f9693.exe"C:\Users\Admin\AppData\Local\Temp\1e716acec0f8c78445db489b74b7c3ff027181e332377773f11530a7669f9693.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Windows\SysWOW64\cmd.execmd.exe /c tasklist3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4116
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c wmic diskdrive get model3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic diskdrive get model4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3024
-
-
-