Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/10/2024, 20:59

General

  • Target

    sideloadly.exe

  • Size

    49.0MB

  • MD5

    2c40a5ac088a61ff8305e9b323e34df4

  • SHA1

    e94105001afd10bc69fa048bcac23abef7b53f80

  • SHA256

    f2fbee8a1b0d85caab961a30e92ada1978604ac5564f2c2effe1555b3d9d653e

  • SHA512

    baf5ee0e4eebabf65010a3f8e83265df976184835ce06e4c3ff8fec23696c51d651ecfb00aa69073b55685008c36fad0eb414392c5639759e78e6a1b7b35a479

  • SSDEEP

    393216:yY3yF22S89lFDAmvdTTWld3b7U7FvV/V17P/u8lH6FJsv6tWKFdu9CJ:l3yI2S89lFDAiTald/U7FN/bs/

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies registry class 9 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\sideloadly.exe
    "C:\Users\Admin\AppData\Local\Temp\sideloadly.exe"
    1⤵
    • Adds Run key to start application
    • Modifies registry class
    • Modifies system certificate store
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4500
    • C:\Users\Admin\AppData\Local\Temp\sideloadlydaemon.exe
      C:\Users\Admin\AppData\Local\Temp\sideloadlydaemon.exe -v
      2⤵
        PID:5004
      • C:\Users\Admin\AppData\Local\Temp\sideloadlydaemon.exe
        C:\Users\Admin\AppData\Local\Temp\sideloadlydaemon.exe -v
        2⤵
          PID:4872
        • C:\Users\Admin\AppData\Local\Temp\redist549271607.exe
          C:\Users\Admin\AppData\Local\Temp\redist549271607.exe /q /norestart
          2⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2392
          • C:\Users\Admin\AppData\Local\Temp\redist549271607.exe
            "C:\Users\Admin\AppData\Local\Temp\redist549271607.exe" /q /norestart -burn.unelevated BurnPipe.{1332CF84-8E86-4E4D-BC7D-28BE23AE79FC} {1F8FA674-EB83-44C4-9288-E4387390FCA4} 2392
            3⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            PID:5068
        • C:\Users\Admin\AppData\Local\Temp\sideloadlydaemon.exe
          C:\Users\Admin\AppData\Local\Temp\sideloadlydaemon.exe
          2⤵
            PID:3244
            • C:\Users\Admin\AppData\Local\Temp\sideloadly.exe
              C:\Users\Admin\AppData\Local\Temp\sideloadly.exe -v
              3⤵
                PID:4412
          • C:\Windows\system32\vssvc.exe
            C:\Windows\system32\vssvc.exe
            1⤵
            • Checks SCSI registry key(s)
            • Suspicious use of AdjustPrivilegeToken
            PID:3568
          • C:\Windows\system32\srtasks.exe
            C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
            1⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:2732

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\redist549271607.exe

            Filesize

            6.9MB

            MD5

            49b1164f8e95ec6409ea83cdb352d8da

            SHA1

            1194e6bf4153fa88f20b2a70ac15bc359ada4ee2

            SHA256

            a4bba7701e355ae29c403431f871a537897c363e215cafe706615e270984f17c

            SHA512

            29b65e45ce5233f5ad480673752529026f59a760466a1026bb92fc78d1ccc82396ecb8f07b0e49c9b2315dbef976cb417273c77f4209475036775fe687dd2d60

          • C:\Users\Admin\AppData\Local\Temp\{042d26ef-3dbe-4c25-95d3-4c1b11b235a7}\.ba1\logo.png

            Filesize

            1KB

            MD5

            d6bd210f227442b3362493d046cea233

            SHA1

            ff286ac8370fc655aea0ef35e9cf0bfcb6d698de

            SHA256

            335a256d4779ec5dcf283d007fb56fd8211bbcaf47dcd70fe60ded6a112744ef

            SHA512

            464aaab9e08de610ad34b97d4076e92dc04c2cdc6669f60bfc50f0f9ce5d71c31b8943bd84cee1a04fb9ab5bbed3442bd41d9cb21a0dd170ea97c463e1ce2b5b

          • C:\Users\Admin\AppData\Local\Temp\{042d26ef-3dbe-4c25-95d3-4c1b11b235a7}\.ba1\wixstdba.dll

            Filesize

            117KB

            MD5

            a52e5220efb60813b31a82d101a97dcb

            SHA1

            56e16e4df0944cb07e73a01301886644f062d79b

            SHA256

            e7c8e7edd9112137895820e789baaaeca41626b01fb99fede82968ddb66d02cf

            SHA512

            d6565ba18b5b9795d6bde3ef94d8f7cd77bf8bb69ba3fe7adefb80fc7c5d888cdfdc79238d86a0839846aea4a1e51fc0caed3d62f7054885e8b15fad9f6c654e

          • memory/3244-41-0x0000000000400000-0x0000000002ECA000-memory.dmp

            Filesize

            42.8MB

          • memory/3244-60-0x0000000000400000-0x0000000002ECA000-memory.dmp

            Filesize

            42.8MB

          • memory/3244-50-0x0000000000400000-0x0000000002ECA000-memory.dmp

            Filesize

            42.8MB

          • memory/3244-47-0x0000000000400000-0x0000000002ECA000-memory.dmp

            Filesize

            42.8MB

          • memory/4412-38-0x00007FF9F3B20000-0x00007FF9F55ED000-memory.dmp

            Filesize

            26.8MB

          • memory/4412-37-0x0000000000400000-0x0000000003537000-memory.dmp

            Filesize

            49.2MB

          • memory/4500-42-0x0000000000400000-0x0000000003537000-memory.dmp

            Filesize

            49.2MB

          • memory/4500-55-0x0000000000400000-0x0000000003537000-memory.dmp

            Filesize

            49.2MB

          • memory/4500-40-0x00007FF9F3B20000-0x00007FF9F55ED000-memory.dmp

            Filesize

            26.8MB

          • memory/4500-76-0x0000000000400000-0x0000000003537000-memory.dmp

            Filesize

            49.2MB

          • memory/4500-45-0x0000000000400000-0x0000000003537000-memory.dmp

            Filesize

            49.2MB

          • memory/4500-26-0x00007FF9F3B20000-0x00007FF9F55ED000-memory.dmp

            Filesize

            26.8MB

          • memory/4500-48-0x0000000000400000-0x0000000003537000-memory.dmp

            Filesize

            49.2MB

          • memory/4500-25-0x0000000000400000-0x0000000003537000-memory.dmp

            Filesize

            49.2MB

          • memory/4500-51-0x0000000000400000-0x0000000003537000-memory.dmp

            Filesize

            49.2MB

          • memory/4500-39-0x0000000000400000-0x0000000003537000-memory.dmp

            Filesize

            49.2MB

          • memory/4500-58-0x0000000000400000-0x0000000003537000-memory.dmp

            Filesize

            49.2MB

          • memory/4500-73-0x0000000000400000-0x0000000003537000-memory.dmp

            Filesize

            49.2MB

          • memory/4500-61-0x0000000000400000-0x0000000003537000-memory.dmp

            Filesize

            49.2MB

          • memory/4500-64-0x0000000000400000-0x0000000003537000-memory.dmp

            Filesize

            49.2MB

          • memory/4500-67-0x0000000000400000-0x0000000003537000-memory.dmp

            Filesize

            49.2MB

          • memory/4500-70-0x0000000000400000-0x0000000003537000-memory.dmp

            Filesize

            49.2MB

          • memory/4872-1-0x0000000000400000-0x0000000002ECA000-memory.dmp

            Filesize

            42.8MB

          • memory/5004-0-0x0000000000400000-0x0000000002ECA000-memory.dmp

            Filesize

            42.8MB