Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
07/07/2023, 12:22
Behavioral task
behavioral1
Sample
481f5ad7541644exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
481f5ad7541644exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
481f5ad7541644exeexeexeex.exe
-
Size
100KB
-
MD5
481f5ad7541644deb1b41b11d88e1f74
-
SHA1
7aac4c6efdc3c61a9d752ea313fcc7075e3a86f4
-
SHA256
dcb968e356e2d662b4a13c4556602efaa0669cbe7e99270764456500c86c76ee
-
SHA512
c723d0b45aed7b17119cda0ed21775f927296602a01af1cde3f87c57df3e57326b39a66f9741a9bbeb096c2726f824aef8fb10194a131609c98b9057f1bb7cfc
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpQbCJjMc/:AnBdOOtEvwDpj6z6
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\Control Panel\International\Geo\Nation 481f5ad7541644exeexeexeex.exe -
Executes dropped EXE 1 IoCs
pid Process 2248 asih.exe -
resource yara_rule behavioral2/memory/840-141-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral2/files/0x00080000000231fe-145.dat upx behavioral2/files/0x00080000000231fe-147.dat upx behavioral2/files/0x00080000000231fe-149.dat upx behavioral2/memory/2248-157-0x0000000000500000-0x000000000050F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 840 wrote to memory of 2248 840 481f5ad7541644exeexeexeex.exe 84 PID 840 wrote to memory of 2248 840 481f5ad7541644exeexeexeex.exe 84 PID 840 wrote to memory of 2248 840 481f5ad7541644exeexeexeex.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\481f5ad7541644exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\481f5ad7541644exeexeexeex.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2248
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
100KB
MD517749cda560345bb71e47f6e5277e522
SHA18b0a3299857abcbbbcc75cb075f442ba20406a25
SHA256777346c50acb8bc5c48093b6bc5ff48208ae59836e1ead1647f80f5d3dfdc49f
SHA5120ccb23f411cbafac9d49ec499eab92d731d2fb0d5d56bc634a879ed1b4ae276caee8f565a9c2ae15baf8164b43e7bfa4127c564b9a750c1c411161d32f8f218f
-
Filesize
100KB
MD517749cda560345bb71e47f6e5277e522
SHA18b0a3299857abcbbbcc75cb075f442ba20406a25
SHA256777346c50acb8bc5c48093b6bc5ff48208ae59836e1ead1647f80f5d3dfdc49f
SHA5120ccb23f411cbafac9d49ec499eab92d731d2fb0d5d56bc634a879ed1b4ae276caee8f565a9c2ae15baf8164b43e7bfa4127c564b9a750c1c411161d32f8f218f
-
Filesize
100KB
MD517749cda560345bb71e47f6e5277e522
SHA18b0a3299857abcbbbcc75cb075f442ba20406a25
SHA256777346c50acb8bc5c48093b6bc5ff48208ae59836e1ead1647f80f5d3dfdc49f
SHA5120ccb23f411cbafac9d49ec499eab92d731d2fb0d5d56bc634a879ed1b4ae276caee8f565a9c2ae15baf8164b43e7bfa4127c564b9a750c1c411161d32f8f218f