Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
06/07/2023, 16:32
Behavioral task
behavioral1
Sample
3dc83557dc6a87exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
3dc83557dc6a87exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
3dc83557dc6a87exeexeexeex.exe
-
Size
79KB
-
MD5
3dc83557dc6a87bd326b18e3d6775b4f
-
SHA1
d84e4d66379dbc2d859e2802b51e2ebecf849866
-
SHA256
0eae9edc4ab9293669b69423b11f0e77c0c23f371e738bd6143ac3ba5d2e6a40
-
SHA512
4634299254787cef529d87b48e97896ea57fc367a73a27e2886acad77aa450656bd097ed6972923b7996d83c4ec68d4e191612e0e171c8d952ea1a941b90df8e
-
SSDEEP
1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalDSnUg:1nK6a+qdOOtEvwDpjb
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\Control Panel\International\Geo\Nation 3dc83557dc6a87exeexeexeex.exe -
Executes dropped EXE 1 IoCs
pid Process 2692 asih.exe -
resource yara_rule behavioral2/memory/836-134-0x0000000000500000-0x000000000050F311-memory.dmp upx behavioral2/files/0x00070000000231ca-145.dat upx behavioral2/files/0x00070000000231ca-147.dat upx behavioral2/files/0x00070000000231ca-148.dat upx behavioral2/memory/2692-156-0x0000000000500000-0x000000000050F311-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 836 wrote to memory of 2692 836 3dc83557dc6a87exeexeexeex.exe 84 PID 836 wrote to memory of 2692 836 3dc83557dc6a87exeexeexeex.exe 84 PID 836 wrote to memory of 2692 836 3dc83557dc6a87exeexeexeex.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\3dc83557dc6a87exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\3dc83557dc6a87exeexeexeex.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2692
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
79KB
MD53ce16eb1d58b31fe105761568e94c0e0
SHA1f70deaec2f8d267266a80b3ef1e40a8898556552
SHA256c115d8e1b29c788792c1d5be72f42616daf9e102a6742c22afb520cc07c39c91
SHA512fddf4605ce1f0fe4947d4bc5ad597d5a5927b2e4e59634d9c067732dcbe8b1d5b69f3d746380f874a6dd7201590ccbbadc2eae7fba34f75a6ec7a1e4cc1b3f23
-
Filesize
79KB
MD53ce16eb1d58b31fe105761568e94c0e0
SHA1f70deaec2f8d267266a80b3ef1e40a8898556552
SHA256c115d8e1b29c788792c1d5be72f42616daf9e102a6742c22afb520cc07c39c91
SHA512fddf4605ce1f0fe4947d4bc5ad597d5a5927b2e4e59634d9c067732dcbe8b1d5b69f3d746380f874a6dd7201590ccbbadc2eae7fba34f75a6ec7a1e4cc1b3f23
-
Filesize
79KB
MD53ce16eb1d58b31fe105761568e94c0e0
SHA1f70deaec2f8d267266a80b3ef1e40a8898556552
SHA256c115d8e1b29c788792c1d5be72f42616daf9e102a6742c22afb520cc07c39c91
SHA512fddf4605ce1f0fe4947d4bc5ad597d5a5927b2e4e59634d9c067732dcbe8b1d5b69f3d746380f874a6dd7201590ccbbadc2eae7fba34f75a6ec7a1e4cc1b3f23