Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
05/07/2023, 18:07
Behavioral task
behavioral1
Sample
19f6dfafd09073exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
19f6dfafd09073exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
19f6dfafd09073exeexeexeex.exe
-
Size
79KB
-
MD5
19f6dfafd090734cf67f00977bd173c8
-
SHA1
145031be5d55d226eebabbb4fe1c89b5e21b5745
-
SHA256
a66bf81c19a79e0c0310705aa989434f86ae2b18ca9fc82f374e56d9fad65cb3
-
SHA512
618f0b82d097598787a94ce162233360b22422564d7133f6a6ab3c26b9d8c227305713b20f73845dadc3258d1465a03204e971df07b870bce8951c4909eb4db7
-
SSDEEP
1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalDSnUV:1nK6a+qdOOtEvwDpj6
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\Control Panel\International\Geo\Nation 19f6dfafd09073exeexeexeex.exe -
Executes dropped EXE 1 IoCs
pid Process 3596 asih.exe -
resource yara_rule behavioral2/memory/892-136-0x0000000000500000-0x000000000050F311-memory.dmp upx behavioral2/files/0x0007000000023206-145.dat upx behavioral2/files/0x0007000000023206-147.dat upx behavioral2/files/0x0007000000023206-148.dat upx behavioral2/memory/3596-156-0x0000000000500000-0x000000000050F311-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 892 wrote to memory of 3596 892 19f6dfafd09073exeexeexeex.exe 88 PID 892 wrote to memory of 3596 892 19f6dfafd09073exeexeexeex.exe 88 PID 892 wrote to memory of 3596 892 19f6dfafd09073exeexeexeex.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\19f6dfafd09073exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\19f6dfafd09073exeexeexeex.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:3596
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
79KB
MD50d968eef89a706e9b89d90eae9933660
SHA195ad6186ff5f5cbbbc9f9ce960a2ae5764930ad9
SHA25633eacf9616951f40a0c69c8552514826e19621fef94eeb6f6b8ef91c0b370c9d
SHA512056fcd887983b4354e81e248933dbfe6feb29b03d9b5ebfaf4eed083ee5f038e3cbf6cb43d06360eb75787dffecf967cc5f0beb9ac8f434eef506fb4e0a143b0
-
Filesize
79KB
MD50d968eef89a706e9b89d90eae9933660
SHA195ad6186ff5f5cbbbc9f9ce960a2ae5764930ad9
SHA25633eacf9616951f40a0c69c8552514826e19621fef94eeb6f6b8ef91c0b370c9d
SHA512056fcd887983b4354e81e248933dbfe6feb29b03d9b5ebfaf4eed083ee5f038e3cbf6cb43d06360eb75787dffecf967cc5f0beb9ac8f434eef506fb4e0a143b0
-
Filesize
79KB
MD50d968eef89a706e9b89d90eae9933660
SHA195ad6186ff5f5cbbbc9f9ce960a2ae5764930ad9
SHA25633eacf9616951f40a0c69c8552514826e19621fef94eeb6f6b8ef91c0b370c9d
SHA512056fcd887983b4354e81e248933dbfe6feb29b03d9b5ebfaf4eed083ee5f038e3cbf6cb43d06360eb75787dffecf967cc5f0beb9ac8f434eef506fb4e0a143b0