Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/10/2024, 07:06

General

  • Target

    20e62180a2816d92a27ae333d74a2057b5fd27cbbd6b4e4da7ce5ce6f706a729N.exe

  • Size

    1016KB

  • MD5

    18e163786a650174a88b891fd947c890

  • SHA1

    ca5914aa9b8d04bde6c230dfb3ba12284556a0de

  • SHA256

    20e62180a2816d92a27ae333d74a2057b5fd27cbbd6b4e4da7ce5ce6f706a729

  • SHA512

    f0d5c8d3bd1adcab128c323c4f2bd3596bfb548e07e97c9324aaca689a42d73748f0897af197d86bc661a994256a8c4edd75bae313ef0cc9e3a16c9808174ed5

  • SSDEEP

    6144:oIXsL0tvrSVz1DnemeYbpsnEf78AoXh6KkiD0OofzA+/VygHUry:oIXsgtvm1De5YlOx6lzBH46Ury

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 4 IoCs
  • UAC bypass 3 TTPs 13 IoCs
  • Adds policy Run key to start application 2 TTPs 30 IoCs
  • Disables RegEdit via registry modification 6 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Impair Defenses: Safe Mode Boot 1 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 64 IoCs
  • Checks whether UAC is enabled 1 TTPs 8 IoCs
  • Hijack Execution Flow: Executable Installer File Permissions Weakness 1 TTPs 3 IoCs

    Possible Turn off User Account Control's privilege elevation for standard users.

  • Looks up external IP address via web service 5 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops autorun.inf file 1 TTPs 4 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 32 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 32 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • System policy modification 1 TTPs 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\20e62180a2816d92a27ae333d74a2057b5fd27cbbd6b4e4da7ce5ce6f706a729N.exe
    "C:\Users\Admin\AppData\Local\Temp\20e62180a2816d92a27ae333d74a2057b5fd27cbbd6b4e4da7ce5ce6f706a729N.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4436
    • C:\Users\Admin\AppData\Local\Temp\wfsgytrrgpc.exe
      "C:\Users\Admin\AppData\Local\Temp\wfsgytrrgpc.exe" "c:\users\admin\appdata\local\temp\20e62180a2816d92a27ae333d74a2057b5fd27cbbd6b4e4da7ce5ce6f706a729n.exe*"
      2⤵
      • Modifies WinLogon for persistence
      • UAC bypass
      • Adds policy Run key to start application
      • Disables RegEdit via registry modification
      • Checks computer location settings
      • Executes dropped EXE
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Hijack Execution Flow: Executable Installer File Permissions Weakness
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:232
      • C:\Users\Admin\AppData\Local\Temp\xbirelm.exe
        "C:\Users\Admin\AppData\Local\Temp\xbirelm.exe" "-C:\Users\Admin\AppData\Local\Temp\wjzrndngyhftlebb.exe"
        3⤵
        • Modifies WinLogon for persistence
        • UAC bypass
        • Adds policy Run key to start application
        • Disables RegEdit via registry modification
        • Executes dropped EXE
        • Impair Defenses: Safe Mode Boot
        • Adds Run key to start application
        • Checks whether UAC is enabled
        • Hijack Execution Flow: Executable Installer File Permissions Weakness
        • Drops autorun.inf file
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • System policy modification
        PID:2128
      • C:\Users\Admin\AppData\Local\Temp\xbirelm.exe
        "C:\Users\Admin\AppData\Local\Temp\xbirelm.exe" "-C:\Users\Admin\AppData\Local\Temp\wjzrndngyhftlebb.exe"
        3⤵
        • Modifies WinLogon for persistence
        • UAC bypass
        • Adds policy Run key to start application
        • Disables RegEdit via registry modification
        • Executes dropped EXE
        • Adds Run key to start application
        • Checks whether UAC is enabled
        • Hijack Execution Flow: Executable Installer File Permissions Weakness
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System policy modification
        PID:3768
    • C:\Users\Admin\AppData\Local\Temp\wfsgytrrgpc.exe
      "C:\Users\Admin\AppData\Local\Temp\wfsgytrrgpc.exe" "c:\users\admin\appdata\local\temp\20e62180a2816d92a27ae333d74a2057b5fd27cbbd6b4e4da7ce5ce6f706a729n.exe"
      2⤵
      • Modifies WinLogon for persistence
      • UAC bypass
      • Adds policy Run key to start application
      • Executes dropped EXE
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System policy modification
      PID:1840

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\axxzffzcexfdfipzmbaxxz.fzc

    Filesize

    280B

    MD5

    bd2520430957911f1629a6889d5cd609

    SHA1

    e4ea07540c39c3c35cf9dff4794dcc5d8e85fa6d

    SHA256

    cec705fe0a99f3642724537a5a9c8b1ed540ada1ab7ff6afe48b7844ae3156a4

    SHA512

    f74582b5981139508441459cc7faff963c8a256325d25c3bf3ad89dab4399c0c64c26f202ce801f89e663f2fd1dd28fd3682492c2334bac610f3e23009b61afd

  • C:\Program Files (x86)\axxzffzcexfdfipzmbaxxz.fzc

    Filesize

    280B

    MD5

    60e7c1af90ac7da71ab7ff9ca7eca481

    SHA1

    b1dd5e4d5394074eb0cdcd345cd57e8b3221e224

    SHA256

    0884f711eb0f0f222a995a87690e8fa4b1e091da84c14ec26dd07d9175286963

    SHA512

    415a35a0d3a9b77a106376fd5e86e205f1414643646624da953f5f52caa9b5ca8ba65c455eda0738ded55d3a9b451e6174d55b4fdcd3e815f43fe27fa531a6ac

  • C:\Program Files (x86)\axxzffzcexfdfipzmbaxxz.fzc

    Filesize

    280B

    MD5

    dd5a5934166cf23a244d110833d1a514

    SHA1

    8790fea21559a96444a43ba8f7b961fcb38978a9

    SHA256

    1b3f45335c0e382b492ec9c2d48a8f45fafa62070a8e80ba5e465019b910e227

    SHA512

    30c8b0500f331dc46dae05ccb5cacc461454debddb9668df5ce926a820e4d9469103682b8b18992bd9be59ecf7b1549031780a2613448981c9d64d5b9c6b9423

  • C:\Program Files (x86)\axxzffzcexfdfipzmbaxxz.fzc

    Filesize

    280B

    MD5

    4273527bcde7f63d256b13c02e66295b

    SHA1

    9974395a47c3e36fb3d57c8d9d8f9b94690753f0

    SHA256

    d571e4e68e78228dd975a16024d0308b2c778cf895636a98e18091e7506a4a9e

    SHA512

    f2d4dc89ab7bab75f6839f93eb0eab5d525b80985742809840c75a76fe28cbdf6c3ee4235e36dd3a0138050fd70a099c87c98fca210820099bae6c05734c76d4

  • C:\Program Files (x86)\axxzffzcexfdfipzmbaxxz.fzc

    Filesize

    280B

    MD5

    54da4b15022449b8ef5727c03c7de026

    SHA1

    6a7599c18dc061c58aeb99e5edbe95774eaa858f

    SHA256

    dd035da461c6f9998271ebd6f583a412f070fe3a1f115a8010a7c759be3a9818

    SHA512

    38f54d1ad16f024a1e69f0d7bfb9d332bf1ea873eef56f0283722de2cd8fed1bb1e6be3cf007631ce3430fef3315acd94dd1bed4b603bf051a99662d98fe1ac5

  • C:\Users\Admin\AppData\Local\Temp\wfsgytrrgpc.exe

    Filesize

    320KB

    MD5

    f0e64f88e32c65a9ffa6acbf7d068743

    SHA1

    0e847534b1ba79db51e9c1faf90d7e7a2aea4b54

    SHA256

    b9a8304a7d1499f6b9465b6065c0c4bd1eac06a139f094f70855dac331309e95

    SHA512

    6f0a9bdecdf1272443049e63a50a18069f4500bf895f1805fe5f999901ea097d1a18026db3b252642c31db402490a81293279263ba9f4adf2ef267f7ca8799c1

  • C:\Users\Admin\AppData\Local\Temp\xbirelm.exe

    Filesize

    716KB

    MD5

    2fabd71cb31622fb7c9bf141026ae7ce

    SHA1

    a2d3be08077ab76dde50f16b2cbeb1fab020ff96

    SHA256

    a91c95a52f0bf2b1492efd46567b2126cf937ea37c4478bd154f43e5a42c8058

    SHA512

    13248094dd253d391fbcfb099838524b791cfc7b196cbe177ac8f44df2f4250f9cbc2213cacd74106356e2254988e46960aaa25b9bb9dc0115f3290475108c75

  • C:\Users\Admin\AppData\Local\axxzffzcexfdfipzmbaxxz.fzc

    Filesize

    280B

    MD5

    0d313f1d798a60b1d63a91ae432b1791

    SHA1

    8c2e69121f79a185d92c35d9c89ba4e490d77dd2

    SHA256

    23411534781d27b8888543349b15cdc176abcea22146a44d91fb64f7678ead6d

    SHA512

    cf1573b945a0ea1dc17c58fc70d6f7d822ff7d4de061999fea35f04b71a9f1528ea0bb0e06b03bba10dbb7aa55525ed1478f0d46a43453665d4dc1200c168177

  • C:\Users\Admin\AppData\Local\axxzffzcexfdfipzmbaxxz.fzc

    Filesize

    280B

    MD5

    8498f1c12c297e8759f20548017da75b

    SHA1

    4874183500a81b446375d40c80df65b846e50164

    SHA256

    b58d6fc5512a729679df757ee4be580da093f32b8ee9918e8324777f683a89ff

    SHA512

    7b41e628f389b8994de6a6f7cd2077358cf62276844f37671a20f39994ce710113b42c8ef98dcd7dc33cb940bf8b36fc43ba06bdf7cf07f77d4dc7ef296c7e30

  • C:\Users\Admin\AppData\Local\rzkxozesfjclymezxxhpanepuivzsbocu.nnx

    Filesize

    4KB

    MD5

    27cf167481e7338b3b8f15d443ffed31

    SHA1

    09c85eb3ff60676c52d105c773adfec126718af4

    SHA256

    95386002abe6c00a82a26ed880b962b2b21558a30a1686391320b941ac2fdbc4

    SHA512

    9667c13cbe5635ce3886ba24cb033a2b991b43122e32d403021f60f2691921ceec1e2b27ff3ba22316aa73cb83b96f6943f8a335b073e2c15a8bf242e147a18e

  • C:\Windows\SysWOW64\mbtnldpkeppfzutvah.exe

    Filesize

    1016KB

    MD5

    18e163786a650174a88b891fd947c890

    SHA1

    ca5914aa9b8d04bde6c230dfb3ba12284556a0de

    SHA256

    20e62180a2816d92a27ae333d74a2057b5fd27cbbd6b4e4da7ce5ce6f706a729

    SHA512

    f0d5c8d3bd1adcab128c323c4f2bd3596bfb548e07e97c9324aaca689a42d73748f0897af197d86bc661a994256a8c4edd75bae313ef0cc9e3a16c9808174ed5