Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    91s
  • max time network
    92s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/10/2024, 05:12

General

  • Target

    0b84008fd4237fdd2a952ba968aec2b0e429801cbab4a016ee32db6e4eeb283bN.exe

  • Size

    1.8MB

  • MD5

    8ae84d125b4d3cca4b310a9f519747a0

  • SHA1

    9f28f6eecb9ce84bd918f22c9af5f6e102ef6e57

  • SHA256

    0b84008fd4237fdd2a952ba968aec2b0e429801cbab4a016ee32db6e4eeb283b

  • SHA512

    15268db416f0bcc2512f7f62d95903ea559f8e2fe697adcfc05067a03453d1b3c748040882010ed565bda1ee6f2fad92c1c24a88c369ed81ccfc776236f40d49

  • SSDEEP

    24576:bMbXdVtTj2i64T+jdxQCfgOFD3WSwd2QtBBw6xxhVxQtmibjOhZaiRu/4oMaop0P:bMhbTChxKCnFnQXBbrtgb/iQvu0UHOaE

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0b84008fd4237fdd2a952ba968aec2b0e429801cbab4a016ee32db6e4eeb283bN.exe
    "C:\Users\Admin\AppData\Local\Temp\0b84008fd4237fdd2a952ba968aec2b0e429801cbab4a016ee32db6e4eeb283bN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3728
    • C:\Windows\SysWOW64\explorer.exe
      explorer.exe
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1084
      • C:\Users\Admin\AppData\Local\Temp\@AED67A.tmp.exe
        "C:\Users\Admin\AppData\Local\Temp\@AED67A.tmp.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2656
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Admin0.bat" "
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4820
          • C:\Users\Admin\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe
            "C:\Users\Admin\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe"
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:3760
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Admin1.bat" "
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:744
              • C:\Users\Admin\AppData\Roaming\Microsoft\Defender\launch.exe
                "C:\Users\Admin\AppData\Roaming\Microsoft\Defender\launch.exe" /i 3760
                7⤵
                • Checks computer location settings
                • Executes dropped EXE
                • Adds Run key to start application
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:3156
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Admin2.bat" "
                  8⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:976
                  • C:\Users\Admin\AppData\Local\Temp\wtmps.exe
                    "C:\Users\Admin\AppData\Local\Temp\wtmps.exe"
                    9⤵
                    • Executes dropped EXE
                    • Drops file in System32 directory
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of WriteProcessMemory
                    PID:412
                    • C:\Windows\SysWOW64\mscaps.exe
                      "C:\Windows\system32\mscaps.exe" /C:\Users\Admin\AppData\Local\Temp\wtmps.exe
                      10⤵
                      • Executes dropped EXE
                      PID:4776
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Admin1.bat" "
          4⤵
          • System Location Discovery: System Language Discovery
          PID:4048
      • C:\Users\Admin\AppData\Local\Temp\0b84008fd4237fdd2a952ba968aec2b0e429801cbab4a016ee32db6e4eeb283bN.exe
        "C:\Users\Admin\AppData\Local\Temp\0b84008fd4237fdd2a952ba968aec2b0e429801cbab4a016ee32db6e4eeb283bN.exe"
        3⤵
        • Modifies visibility of file extensions in Explorer
        • Modifies visiblity of hidden/system files in Explorer
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        PID:2416
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:4492

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\0b84008fd4237fdd2a952ba968aec2b0e429801cbab4a016ee32db6e4eeb283bN.exe

      Filesize

      98KB

      MD5

      bc1632e3622b50f0c3229eab9f9887d9

      SHA1

      bad1291ae3c33bfed2288b3ea4a30d6c52dc7d02

      SHA256

      4be220fe98d5e6743e8031292df3bfddd9d32f1600ef5c8854b4f90bdb19ef05

      SHA512

      3df7c3cef642fddad2a7e2be2a7fb8ee7690493ae299f7222aa5375fbcbe7289a20dab645d498a06024f86bfa8a98b99fb122bdaddfe7cd080b717496b0e6d9e

    • C:\Users\Admin\AppData\Local\Temp\@AED67A.tmp.exe

      Filesize

      1.7MB

      MD5

      1ff1843e6a7eead8d84d5782d8be0a8c

      SHA1

      49056c9a4c7deac17948549a76456011efc5447b

      SHA256

      3629d15c90e8c7b0b2b127b1dcc5da9ae5e0458804468406e5816db165d745cc

      SHA512

      a0c21b5f288a4ca935960260217890491bae9625e0fabc1040cf4aa5d53971bd0d87f171df0866b28db4e478ca37b322c034fbc36501452c94f3a4a4be57079b

    • C:\Users\Admin\AppData\Local\Temp\EAAE.tmp

      Filesize

      406B

      MD5

      37512bcc96b2c0c0cf0ad1ed8cfae5cd

      SHA1

      edf7f17ce28e1c4c82207cab8ca77f2056ea545c

      SHA256

      27e678bf5dc82219d6edd744f0b82567a26e40f8a9dcd6487205e13058e3ed1f

      SHA512

      6d4252ab5aa441a76ce2127224fefcb221259ab4d39f06437b269bd6bfdaae009c8f34e9603ec734159553bc9f1359bdd70316cd426d73b171a9f17c41077641

    • C:\Users\Admin\AppData\Local\Temp\tmpDDBD.tmp

      Filesize

      1.0MB

      MD5

      09fb5503125289ff47fb22e116657214

      SHA1

      dfe2f43fecda79824a668d94449917e6fab9ecb8

      SHA256

      11a1383b8c058ef364839159441ff346e7828bf674acf5c58b8ff270b87481c3

      SHA512

      8cf9b68c8cbba8f7280fe3a50f645406d28fe9c38d7b4588351ed0390dd051333292fb58ad73f83b659ee0b3cf39559236ac3e6d71cf9edf697c7bd558e44863

    • C:\Users\Admin\AppData\Local\Temp\tmpDDED.tmp

      Filesize

      229KB

      MD5

      6f90e1169d19dfde14d6f753f06c862b

      SHA1

      e9bca93c68d7df73d000f4a6e6eb73a343682ac5

      SHA256

      70a392389aecd0f58251e72c3fd7e9159f481061d14209ff8708a0fd9ff584dc

      SHA512

      f0c898222e9578c01ebe1befac27a3fb68d8fb6e76c7d1dec7a8572c1aa3201bacf1e69aa63859e95606790cf09962bcf7dc33b770a6846bed5bd7ded957b0b3

    • C:\Users\Admin\AppData\Local\Temp\tmpDDEE.tmp

      Filesize

      120KB

      MD5

      f558c76b0376af9273717fa24d99ebbf

      SHA1

      f84bcece5c6138b62ef94e9d668cf26178ee14cc

      SHA256

      01631353726dc51bcea311dbc012572cf96775e516b1c79a2de572ef15954b7a

      SHA512

      2092d1e126d0420fec5fc0311d6b99762506563f4890e4049e48e2d87dde5ac3e2e2ecc986ab305de2c6ceb619f18879a69a815d3241ccf8140bc5ea00c6768d

    • C:\Users\Admin\AppData\Local\Temp\tmpDDFF.tmp

      Filesize

      126KB

      MD5

      02ae22335713a8f6d6adf80bf418202b

      SHA1

      4c40c11f43df761b92a5745f85a799db7b389215

      SHA256

      ae5697f849fa48db6d3d13455c224fcf6ceb0602a1e8ac443e211dd0f32d50f4

      SHA512

      727d16102bfc768535b52a37e4e7b5d894f5daa268d220df108382c36dcce063afdbc31fd495a7a61305263ec4cd7e92713d894faa35b585c0b379217a1d929c

    • C:\Users\Admin\AppData\Local\Temp\tmpDE00.tmp

      Filesize

      89KB

      MD5

      09203a9741b91f3a9ed01c82dcb8778d

      SHA1

      13e6f3fb169cd6aa5e4d450417a7e15665a2e140

      SHA256

      63149ad45db380f5dd15f65d9ceb2611d53a0a66e022483bee4ce2ff7d2610e2

      SHA512

      9e9e6fe0dd713417d0e28ba787cf862d55ecda9ee9f3df1eada144657f6a3b6ada1984fd05a3fffcd597a9715383225a8e40b6e5d0d8d39ec0d3a64b8dea9846

    • C:\Users\Admin\AppData\Local\Temp\tmpDE01.tmp

      Filesize

      99KB

      MD5

      9a27bfb55dd768ae81ca8716db2da343

      SHA1

      55da0f4282bd838f72f435a5d4d24ac15b04482b

      SHA256

      5ec8093ef5939d1abce1c576097b584fb600b94ad767c1da897f7cb7f0063d26

      SHA512

      d9bb49d2f282ed09c351a1d8eb2540781e6a7fb39265473fd59d146bfc162f27a4ab1405301ed7395c12929a80551a399437d7d794d7ac48650e9037b60eb69c

    • C:\Users\Admin\AppData\Local\Temp\tmpDE12.tmp

      Filesize

      172KB

      MD5

      2634fa3a332c297711cb59d43f54ffce

      SHA1

      8e2b68d0ee4e792efb1945ba86eceb87f07087d2

      SHA256

      27c945ccb84aa024f1f063701327e829a7ef3a7ede4a43b2febbb1dddbdf8740

      SHA512

      84e4799b9b18a7cc7be685c793a9b4fb135ea331d1d235fe823e1d7091130f131ab2fbad1da4dea795e82547aa16b00f4e2a9faaa96cb522d795f9abfda2fc53

    • C:\Users\Admin\AppData\Local\Temp\tmpDE13.tmp

      Filesize

      276KB

      MD5

      e07c6a9e595f045fadc463dfda44ab16

      SHA1

      e6b199272ade02613f2003c365a4cb1487431e23

      SHA256

      d2fa6f9686386a92253a9c5ea25ace702a111483540b60c1300789235cea7fdc

      SHA512

      f3c630ae8381b99519aeeadbc2918810e7fb09a909f73ee6c46f4e9d3cf8c5051a5cf763db6a775d6cd8713ccf95a63b18df9ed756fa28276e8d7ab6a47f2cbf

    • C:\Users\Admin\AppData\Local\Temp\wtmps.exe

      Filesize

      276KB

      MD5

      75c1467042b38332d1ea0298f29fb592

      SHA1

      f92ea770c2ddb04cf0d20914578e4c482328f0f8

      SHA256

      3b20c853d4ca23240cd338b8cab16f1027c540ddfe9c4ffdca1624d2f923b373

      SHA512

      5c47c59ad222e2597ccdf2c100853c48f022e933f44c279154346eacf9e7e6f54214ada541d43a10424035f160b56131aab206c11512a9fd6ea614fbd3160aa0

    • C:\Users\Admin\AppData\Roaming\Microsoft\Defender\launch.exe

      Filesize

      172KB

      MD5

      daac1781c9d22f5743ade0cb41feaebf

      SHA1

      e2549eeeea42a6892b89d354498fcaa8ffd9cac4

      SHA256

      6a7093440420306cf7de53421a67af8a1094771e0aab9535acbd748d08ed766c

      SHA512

      190a7d5291e20002f996edf1e04456bfdff8b7b2f4ef113178bd42a9e5fd89fe6d410ae2c505de0358c4f53f9654ac1caaa8634665afa6d9691640dd4ee86160

    • C:\Users\Admin\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe

      Filesize

      1.7MB

      MD5

      af7b95855334727fcdd7d35c8b03a753

      SHA1

      3f6ac10cef1663203d91cc733e8f2e5e00c34ecf

      SHA256

      9e926b30c7b59a1f8427ae6a03cf97077a6af8018a34195b1d9ff3a2e4a511cc

      SHA512

      bb5bac95a3d6260c68ca3621499040c04634b1d59b2d5c42482047f947bcf273d5cc4c1d714c4b7e90454583f51b324fa9815aa0c7308d81545a823ba30a969e

    • C:\Users\Admin\AppData\Roaming\Temp\Admin0.bat

      Filesize

      129B

      MD5

      d1073c9b34d1bbd570928734aacff6a5

      SHA1

      78714e24e88d50e0da8da9d303bec65b2ee6d903

      SHA256

      b3c704b1a728004fc5e25899d72930a7466d7628dd6ddd795b3000897dfa4020

      SHA512

      4f2b9330e30fcc55245dc5d12311e105b2b2b9d607fbfc4a203c69a740006f0af58d6a01e2da284575a897528da71a2e61a7321034755b78feb646c8dd12347f

    • C:\Users\Admin\AppData\Roaming\Temp\Admin1.bat

      Filesize

      196B

      MD5

      9467568ff41957591940859979c20c20

      SHA1

      4bea7c42f9a8fa3d5937d574d4ea756bdc0233cf

      SHA256

      8fbca8129755b4cb8db9a663651759bacbac3db71bb47eb45fa7d097d58a1d78

      SHA512

      187c494e1c3cb9ca1e5b3574f01b1ba71159a2bbbfa009ca25d146367026b012b0a1900f4f641ef803ea62def1101e200ea8c32657b5adb997fa06835dc3a5b7

    • C:\Users\Admin\AppData\Roaming\Temp\Admin1.bat

      Filesize

      126B

      MD5

      d98b09b7ec6ed02f09b83b8c17cb9c15

      SHA1

      07edf2dd1d4b2539f192d0ae15875265e071ac02

      SHA256

      0532d8105346f762f666bc3411bd50657ad4e7c2dce2c5d7753ead8e1a84828e

      SHA512

      b258abf892b7f9dafa4301dcb44669d50a0d11a1b7e31d0f035fdb8e63646297eeca2aa532ea303af7702561a9ba81c3a93a113aca9e78e6a717ce6fed15b157

    • C:\Users\Admin\AppData\Roaming\Temp\Admin2.bat

      Filesize

      102B

      MD5

      3ca08f080a7a28416774d80552d4aa08

      SHA1

      0b5f0ba641204b27adac4140fd45dce4390dbf24

      SHA256

      4e7d460b8dc9f2c01b4c5a16fb956aced10127bc940e8039a80c6455901ea1f0

      SHA512

      0c64aa462ff70473ef763ec392296fe0ea59b5340c26978531a416732bc3845adf9ca7b673cb7b4ba40cc45674351206096995c43600fccbbbe64e51b6019f01

    • C:\Users\Admin\AppData\Roaming\Temp\mydll.dll

      Filesize

      388KB

      MD5

      8d7db101a7211fe3309dc4dc8cf2dd0a

      SHA1

      6c2781eadf53b3742d16dab2f164baf813f7ac85

      SHA256

      93db7c9699594caa19490280842fbebec3877278c92128b92e63d75fcd01397a

      SHA512

      8b139d447068519997f7bbc2c7c2fe3846b89ae1fba847258277c9ab92a93583b28fae7ffa444768929ed5852cc914c0270446cbf0bd20aca49bde6b6f809c83

    • C:\Windows\SysWOW64\mscaps.exe

      Filesize

      200KB

      MD5

      78d3c8705f8baf7d34e6a6737d1cfa18

      SHA1

      9f09e248a29311dbeefae9d85937b13da042a010

      SHA256

      2c4c9ec8e9291ba5c73f641af2e0c3e1bbd257ac40d9fb9d3faab7cebc978905

      SHA512

      9a3c3175276da58f1bc8d1138e63238c8d8ccfbfa1a8a1338e88525eca47f8d745158bb34396b7c3f25e4296be5f45a71781da33ad0bbdf7ad88a9c305b85609

    • memory/2656-17-0x0000000010000000-0x0000000010015000-memory.dmp

      Filesize

      84KB