Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
67s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
15/05/2023, 02:38
Static task
static1
Behavioral task
behavioral1
Sample
27d3c4f58b48471511fd2597f39987384f76b3113ea5df3a94c55ffe340ea257.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
27d3c4f58b48471511fd2597f39987384f76b3113ea5df3a94c55ffe340ea257.exe
Resource
win10v2004-20230220-en
General
-
Target
27d3c4f58b48471511fd2597f39987384f76b3113ea5df3a94c55ffe340ea257.exe
-
Size
3.8MB
-
MD5
bb822e95e45231a03a063a791d66df2b
-
SHA1
4a6d37d130631be7e24a28d618d30de48d7aa042
-
SHA256
27d3c4f58b48471511fd2597f39987384f76b3113ea5df3a94c55ffe340ea257
-
SHA512
8fb86d9b49db91e26678084c266e95039f1dfe0c9ff0d5dff5f4fd7baeb09e9cf4ef8c46d407cdb6fb1ce409d35f0fac252c8ab70cdd4f46d9b6732531b395e1
-
SSDEEP
98304:mnsmtk2anG8nAiYW1xjfAVXCnXrDgInJBNV/:YLcggoVXiXtJBNV/
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation 27d3c4f58b48471511fd2597f39987384f76b3113ea5df3a94c55ffe340ea257.exe Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Executes dropped EXE 3 IoCs
pid Process 3164 ._cache_27d3c4f58b48471511fd2597f39987384f76b3113ea5df3a94c55ffe340ea257.exe 3948 Synaptics.exe 3344 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 27d3c4f58b48471511fd2597f39987384f76b3113ea5df3a94c55ffe340ea257.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 27d3c4f58b48471511fd2597f39987384f76b3113ea5df3a94c55ffe340ea257.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1288 wrote to memory of 3164 1288 27d3c4f58b48471511fd2597f39987384f76b3113ea5df3a94c55ffe340ea257.exe 86 PID 1288 wrote to memory of 3164 1288 27d3c4f58b48471511fd2597f39987384f76b3113ea5df3a94c55ffe340ea257.exe 86 PID 1288 wrote to memory of 3164 1288 27d3c4f58b48471511fd2597f39987384f76b3113ea5df3a94c55ffe340ea257.exe 86 PID 1288 wrote to memory of 3948 1288 27d3c4f58b48471511fd2597f39987384f76b3113ea5df3a94c55ffe340ea257.exe 87 PID 1288 wrote to memory of 3948 1288 27d3c4f58b48471511fd2597f39987384f76b3113ea5df3a94c55ffe340ea257.exe 87 PID 1288 wrote to memory of 3948 1288 27d3c4f58b48471511fd2597f39987384f76b3113ea5df3a94c55ffe340ea257.exe 87 PID 3948 wrote to memory of 3344 3948 Synaptics.exe 88 PID 3948 wrote to memory of 3344 3948 Synaptics.exe 88 PID 3948 wrote to memory of 3344 3948 Synaptics.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\27d3c4f58b48471511fd2597f39987384f76b3113ea5df3a94c55ffe340ea257.exe"C:\Users\Admin\AppData\Local\Temp\27d3c4f58b48471511fd2597f39987384f76b3113ea5df3a94c55ffe340ea257.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Users\Admin\AppData\Local\Temp\._cache_27d3c4f58b48471511fd2597f39987384f76b3113ea5df3a94c55ffe340ea257.exe"C:\Users\Admin\AppData\Local\Temp\._cache_27d3c4f58b48471511fd2597f39987384f76b3113ea5df3a94c55ffe340ea257.exe"2⤵
- Executes dropped EXE
PID:3164
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
PID:3344
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.8MB
MD5bb822e95e45231a03a063a791d66df2b
SHA14a6d37d130631be7e24a28d618d30de48d7aa042
SHA25627d3c4f58b48471511fd2597f39987384f76b3113ea5df3a94c55ffe340ea257
SHA5128fb86d9b49db91e26678084c266e95039f1dfe0c9ff0d5dff5f4fd7baeb09e9cf4ef8c46d407cdb6fb1ce409d35f0fac252c8ab70cdd4f46d9b6732531b395e1
-
Filesize
3.8MB
MD5bb822e95e45231a03a063a791d66df2b
SHA14a6d37d130631be7e24a28d618d30de48d7aa042
SHA25627d3c4f58b48471511fd2597f39987384f76b3113ea5df3a94c55ffe340ea257
SHA5128fb86d9b49db91e26678084c266e95039f1dfe0c9ff0d5dff5f4fd7baeb09e9cf4ef8c46d407cdb6fb1ce409d35f0fac252c8ab70cdd4f46d9b6732531b395e1
-
Filesize
3.8MB
MD5bb822e95e45231a03a063a791d66df2b
SHA14a6d37d130631be7e24a28d618d30de48d7aa042
SHA25627d3c4f58b48471511fd2597f39987384f76b3113ea5df3a94c55ffe340ea257
SHA5128fb86d9b49db91e26678084c266e95039f1dfe0c9ff0d5dff5f4fd7baeb09e9cf4ef8c46d407cdb6fb1ce409d35f0fac252c8ab70cdd4f46d9b6732531b395e1
-
C:\Users\Admin\AppData\Local\Temp\._cache_27d3c4f58b48471511fd2597f39987384f76b3113ea5df3a94c55ffe340ea257.exe
Filesize3.0MB
MD5674c64a7e4fa94893123da22f8ea30af
SHA12456068eae785cd2cd70990b61a36c3f999ca0a2
SHA256252f7ce9ebbeb17218d390a322720c04a41c4f4186982472e4885a26dfeef709
SHA5126033ec982c889106d2d765a7227610b478e28620228afeadd3b965724e5e8e87af86de2ab3ab219a98b32ad25fb34f72edcb6b87e4ef06d4a86d1cd823bb190c
-
C:\Users\Admin\AppData\Local\Temp\._cache_27d3c4f58b48471511fd2597f39987384f76b3113ea5df3a94c55ffe340ea257.exe
Filesize3.0MB
MD5674c64a7e4fa94893123da22f8ea30af
SHA12456068eae785cd2cd70990b61a36c3f999ca0a2
SHA256252f7ce9ebbeb17218d390a322720c04a41c4f4186982472e4885a26dfeef709
SHA5126033ec982c889106d2d765a7227610b478e28620228afeadd3b965724e5e8e87af86de2ab3ab219a98b32ad25fb34f72edcb6b87e4ef06d4a86d1cd823bb190c
-
C:\Users\Admin\AppData\Local\Temp\._cache_27d3c4f58b48471511fd2597f39987384f76b3113ea5df3a94c55ffe340ea257.exe
Filesize3.0MB
MD5674c64a7e4fa94893123da22f8ea30af
SHA12456068eae785cd2cd70990b61a36c3f999ca0a2
SHA256252f7ce9ebbeb17218d390a322720c04a41c4f4186982472e4885a26dfeef709
SHA5126033ec982c889106d2d765a7227610b478e28620228afeadd3b965724e5e8e87af86de2ab3ab219a98b32ad25fb34f72edcb6b87e4ef06d4a86d1cd823bb190c
-
Filesize
3.0MB
MD5674c64a7e4fa94893123da22f8ea30af
SHA12456068eae785cd2cd70990b61a36c3f999ca0a2
SHA256252f7ce9ebbeb17218d390a322720c04a41c4f4186982472e4885a26dfeef709
SHA5126033ec982c889106d2d765a7227610b478e28620228afeadd3b965724e5e8e87af86de2ab3ab219a98b32ad25fb34f72edcb6b87e4ef06d4a86d1cd823bb190c
-
Filesize
3.0MB
MD5674c64a7e4fa94893123da22f8ea30af
SHA12456068eae785cd2cd70990b61a36c3f999ca0a2
SHA256252f7ce9ebbeb17218d390a322720c04a41c4f4186982472e4885a26dfeef709
SHA5126033ec982c889106d2d765a7227610b478e28620228afeadd3b965724e5e8e87af86de2ab3ab219a98b32ad25fb34f72edcb6b87e4ef06d4a86d1cd823bb190c