Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    94s
  • max time network
    104s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/10/2024, 12:24

General

  • Target

    7aa0f21e3daa05edf5cc09a397247a9471d2e7558703e56fd8f4d1b399dcdcf5N.exe

  • Size

    274KB

  • MD5

    0a7bd79d9cd424f7cf646a7883c6c400

  • SHA1

    8685a2b580bf964af97446a3229a34e32a38501e

  • SHA256

    7aa0f21e3daa05edf5cc09a397247a9471d2e7558703e56fd8f4d1b399dcdcf5

  • SHA512

    ec268ad373b1f36f400383a75452a878212f98e59de075be899f31e5336d2b81f80a7208a7182eeff17982b797380f94c5f7db615cd01c13703a91fd073d62cc

  • SSDEEP

    6144:7saocyLCfcZxEQx8OXsk8Y018Y/+kY6F2hIWFl4WWlGTamELkTVS:7tobwQ+Ock8Y0hZYg2hIWFl5A+CLcVS

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7aa0f21e3daa05edf5cc09a397247a9471d2e7558703e56fd8f4d1b399dcdcf5N.exe
    "C:\Users\Admin\AppData\Local\Temp\7aa0f21e3daa05edf5cc09a397247a9471d2e7558703e56fd8f4d1b399dcdcf5N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3652
    • C:\Users\Admin\AppData\Local\Temp\nsyB596.tmp\installer.exe
      C:\Users\Admin\AppData\Local\Temp\nsyB596.tmp\installer.exe 4fe0cf9f-1fe4-4abb-905a-57915bc06f2f.exe /t /dT131900333S /e5844780 /u4fe0cf9f-1fe4-4abb-905a-57915bc06f2f
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Drops desktop.ini file(s)
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies system certificate store
      • Suspicious use of WriteProcessMemory
      PID:2984
      • C:\Users\Admin\AppData\Local\Temp\nsyB596.tmp\4fe0cf9f-1fe4-4abb-905a-57915bc06f2f.exe
        "C:\Users\Admin\AppData\Local\Temp\nsyB596.tmp\4fe0cf9f-1fe4-4abb-905a-57915bc06f2f.exe" /t /dT131900333S /e5844780 /u4fe0cf9f-1fe4-4abb-905a-57915bc06f2f
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:3552

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\12236C41CDDF9E40BA5606CDF086B821

    Filesize

    75KB

    MD5

    8b601e4a878a5f36fed27d3649df0030

    SHA1

    d198666c5bfa454ab6ca6cb28a5b47923bd2a3a6

    SHA256

    b149e2f1d25834aee44c8e7f9ba60e680862f969dfb00cedb523c8bb3209317a

    SHA512

    eed65ee83b24e8d9965bd507b48806ec51ba929b1a8cd645a15bb6fbd31cdbc784f6d79fef62790299acf287d3624bf55c5076901e4f5ede627aa053be64ad94

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EDCF682921FE94F4A02A43CD1A28E6B

    Filesize

    604B

    MD5

    3a0e39c53630ecfc2720aee27fe32557

    SHA1

    ce9b2fbd4efce495b07ac98b4cb54b12dd3cf3c0

    SHA256

    18da8779683e3e688ac75a896d738eb4e958763e153e56cb06432bafd3d6ef38

    SHA512

    3598a8fa245b68d4ea236355c00c80710105704efb08e889edea0afd79e079224083c0d034e6b2454189bb8057ea9037ae48e0791bc5b6c54a4af90541fda166

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\955CAB6FF6A24D5820D50B5BA1CF79C7_CC1689C2A9A5CB35265F3C2516751959

    Filesize

    5B

    MD5

    4842e206e4cfff2954901467ad54169e

    SHA1

    80c9820ff2efe8aa3d361df7011ae6eee35ec4f0

    SHA256

    2acab1228e8935d5dfdd1756b8a19698b6c8b786c90f87993ce9799a67a96e4e

    SHA512

    ff537b1808fcb03cfb52f768fbd7e7bd66baf6a8558ee5b8f2a02f629e021aa88a1df7a8750bae1f04f3b9d86da56f0bdcba2fdbc81d366da6c97eb76ecb6cba

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\12236C41CDDF9E40BA5606CDF086B821

    Filesize

    202B

    MD5

    ec2775e072e78293c9f08d9d5d3ddc54

    SHA1

    a01191323ad13deff2c5d56e13fd73fca2974f25

    SHA256

    6df6fa3ef3381f81f5431d2f25f13693810cd8e9b15274f86b0370a84c589ddd

    SHA512

    a0c3d44e456ceb5002bc6845cc83c1044fc9b5c7370566001ce61ea808b560bc8f7ebe6af40e6d9294093a2802410048f359b18a6f41b2d07d84abbd3e576040

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EDCF682921FE94F4A02A43CD1A28E6B

    Filesize

    188B

    MD5

    706acc4d405111deb9ff317bb343520c

    SHA1

    178a6ade594c44d8be58b081a170c910f169feea

    SHA256

    2fb51f18f5052862f2b02d59f27fec573ffbefe2cd2f37f0c3ad41010425ad15

    SHA512

    8e72fa655ed4b974bd5310b83097e162c3b73d5dc5db448b01cca451ffd973574832179d3c1fae68a13b2193d002b0e7b91c661645ccc82b646ee86cf388626b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\955CAB6FF6A24D5820D50B5BA1CF79C7_AD9E7615297A3A83320AACE5801A04F9

    Filesize

    404B

    MD5

    8952321ef5f32e71362481985685c6a3

    SHA1

    e8eed6f89b6abd7fcbf017cefe5ba439a463b391

    SHA256

    a3f26d544c0dbbb840865e089f869b7358b72c72a646512c2cb8db1f6b171144

    SHA512

    ec8e27eadd4574e048ee93a5b50689dd3ad5bee5a1a4eef7804f76afe7e9ac70c6b9646add7d9a8fe613aa8ac3c9412cbccb01bd6791ed7de221272b00e19eba

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\955CAB6FF6A24D5820D50B5BA1CF79C7_CC1689C2A9A5CB35265F3C2516751959

    Filesize

    482B

    MD5

    7b96cdc8c2693b1939bc47253dd05f01

    SHA1

    1d7f91010a339f378dd9c91310cffa8fabf91cc5

    SHA256

    b0e73d771a2161f85ab3e0faa1d26d92a552ee1724eeb48d9b6974bb63833696

    SHA512

    66c07c7430625014929ea740800567bd1be840ab0488615875e8c31bef0add0252137c273f9419280aea64a012ddce5cb1ce33dd191384446bd4ff5630824ec3

  • C:\Users\Admin\AppData\Local\Temp\nsyB596.tmp\4fe0cf9f-1fe4-4abb-905a-57915bc06f2f.exe

    Filesize

    256KB

    MD5

    6e68cf541f031c7de9da6ec8d86862aa

    SHA1

    115f143b5f585a27006159dc1b2d4d23a7af5295

    SHA256

    d1763b911eebce060a4c479190e83ff5747f5e75f938fb1cb23d5fcaba249e35

    SHA512

    022af872f2343293a0d71c6cc3ca3f13001ce7ad8e04cf740b75574272cad1dcb40a97a0e860082e7080a69a0367438728f1983317349d5a33ca969c3d877de1

  • C:\Users\Admin\AppData\Local\Temp\nsyB596.tmp\installer.exe

    Filesize

    214KB

    MD5

    7cf3bce5ecf2aea97b49e2eba8ca0aba

    SHA1

    543f5fc23df08f946488d27b2fb16b13b6311d1a

    SHA256

    7358afae03a24b31c0d82ee4e5fd2f17cafe6c3bdd8e26326aa4118f2169f736

    SHA512

    5f9184189940af27e25ae2988db8d15923dac81b2410c5fe3287f126fb50df43735fccb4e4d9f376e9f24700604c157aa1828622dab54014d9583a56ab698d8d

  • C:\Users\Admin\AppData\Local\Temp\nsyB596.tmp\nsExec.dll

    Filesize

    8KB

    MD5

    249ae678f0dac4c625c6de6aca53823a

    SHA1

    6ac2b9e90e8445fed4c45c5dbf2d0227cd3b5201

    SHA256

    7298024a36310b7c4c112be87b61b62a0b1be493e2d5252a19e5e976daf674ce

    SHA512

    66e4081a40f3191bf28b810cf8411cb3c8c3e3ec5943e18d6672414fb5e7b4364f862cba44c9115c599ac90890ef02a773e254e7c979e930946bc52b0693aad7

  • memory/2984-11-0x00000000744D0000-0x0000000074A81000-memory.dmp

    Filesize

    5.7MB

  • memory/2984-10-0x00000000744D0000-0x0000000074A81000-memory.dmp

    Filesize

    5.7MB

  • memory/2984-9-0x00000000744D2000-0x00000000744D3000-memory.dmp

    Filesize

    4KB

  • memory/2984-57-0x00000000744D2000-0x00000000744D3000-memory.dmp

    Filesize

    4KB

  • memory/2984-58-0x00000000744D0000-0x0000000074A81000-memory.dmp

    Filesize

    5.7MB

  • memory/2984-62-0x00000000744D0000-0x0000000074A81000-memory.dmp

    Filesize

    5.7MB

  • memory/3552-44-0x00000000744D0000-0x0000000074A81000-memory.dmp

    Filesize

    5.7MB

  • memory/3552-54-0x00000000744D0000-0x0000000074A81000-memory.dmp

    Filesize

    5.7MB

  • memory/3552-53-0x00000000744D0000-0x0000000074A81000-memory.dmp

    Filesize

    5.7MB

  • memory/3552-55-0x00000000744D0000-0x0000000074A81000-memory.dmp

    Filesize

    5.7MB

  • memory/3552-56-0x00000000744D0000-0x0000000074A81000-memory.dmp

    Filesize

    5.7MB

  • memory/3552-60-0x00000000744D0000-0x0000000074A81000-memory.dmp

    Filesize

    5.7MB

  • memory/3652-66-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB