Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2024, 15:04
Static task
static1
Behavioral task
behavioral1
Sample
3cb1f15cb48c1c929d50487870f3bc5e84b06f306b2ed315fca8a96a5b8c74abN.exe
Resource
win7-20240903-en
General
-
Target
3cb1f15cb48c1c929d50487870f3bc5e84b06f306b2ed315fca8a96a5b8c74abN.exe
-
Size
116KB
-
MD5
edcd41158c2aa45ceb27f4ae2133efe0
-
SHA1
3668b96f737d8d4236bd90235b1618db695c5db2
-
SHA256
3cb1f15cb48c1c929d50487870f3bc5e84b06f306b2ed315fca8a96a5b8c74ab
-
SHA512
5dfd9a68d52402f9e020b6948fa1985ab20baf9b17cc55b69940fd74dc41c09c82a6b01c8e6bfcfd29062575e67cd01b9ef0bad7ee66dca71db483ccc136539c
-
SSDEEP
3072:LoMRmT05NCp/yTeOXIahuID203N7X9yV9GboM9:LoMRmT050/qeqJuI605NyV0
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2312 explorer.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 368 set thread context of 448 368 3cb1f15cb48c1c929d50487870f3bc5e84b06f306b2ed315fca8a96a5b8c74abN.exe 82 -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 548 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3cb1f15cb48c1c929d50487870f3bc5e84b06f306b2ed315fca8a96a5b8c74abN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3cb1f15cb48c1c929d50487870f3bc5e84b06f306b2ed315fca8a96a5b8c74abN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 368 3cb1f15cb48c1c929d50487870f3bc5e84b06f306b2ed315fca8a96a5b8c74abN.exe 368 3cb1f15cb48c1c929d50487870f3bc5e84b06f306b2ed315fca8a96a5b8c74abN.exe 448 3cb1f15cb48c1c929d50487870f3bc5e84b06f306b2ed315fca8a96a5b8c74abN.exe 448 3cb1f15cb48c1c929d50487870f3bc5e84b06f306b2ed315fca8a96a5b8c74abN.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 448 3cb1f15cb48c1c929d50487870f3bc5e84b06f306b2ed315fca8a96a5b8c74abN.exe 2312 explorer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 368 3cb1f15cb48c1c929d50487870f3bc5e84b06f306b2ed315fca8a96a5b8c74abN.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 368 wrote to memory of 448 368 3cb1f15cb48c1c929d50487870f3bc5e84b06f306b2ed315fca8a96a5b8c74abN.exe 82 PID 368 wrote to memory of 448 368 3cb1f15cb48c1c929d50487870f3bc5e84b06f306b2ed315fca8a96a5b8c74abN.exe 82 PID 368 wrote to memory of 448 368 3cb1f15cb48c1c929d50487870f3bc5e84b06f306b2ed315fca8a96a5b8c74abN.exe 82 PID 368 wrote to memory of 448 368 3cb1f15cb48c1c929d50487870f3bc5e84b06f306b2ed315fca8a96a5b8c74abN.exe 82 PID 368 wrote to memory of 448 368 3cb1f15cb48c1c929d50487870f3bc5e84b06f306b2ed315fca8a96a5b8c74abN.exe 82 PID 368 wrote to memory of 448 368 3cb1f15cb48c1c929d50487870f3bc5e84b06f306b2ed315fca8a96a5b8c74abN.exe 82 PID 368 wrote to memory of 448 368 3cb1f15cb48c1c929d50487870f3bc5e84b06f306b2ed315fca8a96a5b8c74abN.exe 82 PID 368 wrote to memory of 448 368 3cb1f15cb48c1c929d50487870f3bc5e84b06f306b2ed315fca8a96a5b8c74abN.exe 82 PID 368 wrote to memory of 448 368 3cb1f15cb48c1c929d50487870f3bc5e84b06f306b2ed315fca8a96a5b8c74abN.exe 82 PID 448 wrote to memory of 2312 448 3cb1f15cb48c1c929d50487870f3bc5e84b06f306b2ed315fca8a96a5b8c74abN.exe 83 PID 448 wrote to memory of 2312 448 3cb1f15cb48c1c929d50487870f3bc5e84b06f306b2ed315fca8a96a5b8c74abN.exe 83 PID 448 wrote to memory of 2312 448 3cb1f15cb48c1c929d50487870f3bc5e84b06f306b2ed315fca8a96a5b8c74abN.exe 83 PID 2312 wrote to memory of 2420 2312 explorer.exe 84 PID 2312 wrote to memory of 2420 2312 explorer.exe 84 PID 2312 wrote to memory of 2420 2312 explorer.exe 84 PID 2312 wrote to memory of 1332 2312 explorer.exe 85 PID 2312 wrote to memory of 1332 2312 explorer.exe 85 PID 2312 wrote to memory of 1332 2312 explorer.exe 85 PID 2312 wrote to memory of 2244 2312 explorer.exe 86 PID 2312 wrote to memory of 2244 2312 explorer.exe 86 PID 2312 wrote to memory of 212 2312 explorer.exe 89 PID 2312 wrote to memory of 212 2312 explorer.exe 89 PID 2312 wrote to memory of 212 2312 explorer.exe 89 PID 2420 wrote to memory of 3548 2420 cmd.exe 90 PID 2420 wrote to memory of 3548 2420 cmd.exe 90 PID 2420 wrote to memory of 3548 2420 cmd.exe 90 PID 1332 wrote to memory of 548 1332 cmd.exe 91 PID 1332 wrote to memory of 548 1332 cmd.exe 91 PID 1332 wrote to memory of 548 1332 cmd.exe 91 PID 3548 wrote to memory of 1228 3548 net.exe 92 PID 3548 wrote to memory of 1228 3548 net.exe 92 PID 3548 wrote to memory of 1228 3548 net.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\3cb1f15cb48c1c929d50487870f3bc5e84b06f306b2ed315fca8a96a5b8c74abN.exe"C:\Users\Admin\AppData\Local\Temp\3cb1f15cb48c1c929d50487870f3bc5e84b06f306b2ed315fca8a96a5b8c74abN.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:368 -
C:\Users\Admin\AppData\Local\Temp\3cb1f15cb48c1c929d50487870f3bc5e84b06f306b2ed315fca8a96a5b8c74abN.exeC:\Users\Admin\AppData\Local\Temp\3cb1f15cb48c1c929d50487870f3bc5e84b06f306b2ed315fca8a96a5b8c74abN.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop mpssvc4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\SysWOW64\net.exenet stop mpssvc5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop mpssvc6⤵
- System Location Discovery: System Language Discovery
PID:1228
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c sc config mpssvc start= disabled4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Windows\SysWOW64\sc.exesc config mpssvc start= disabled5⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:548
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" %14⤵PID:2244
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe4⤵
- System Location Discovery: System Language Discovery
PID:212
-
-
-