Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
07/07/2023, 12:23
Behavioral task
behavioral1
Sample
4853d5e2bc6e90exeexeexeex.exe
Resource
win7-20230705-en
Behavioral task
behavioral2
Sample
4853d5e2bc6e90exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
4853d5e2bc6e90exeexeexeex.exe
-
Size
75KB
-
MD5
4853d5e2bc6e905277fed1b282dc7829
-
SHA1
da6b31ebdea5969db54fdc81318ab8fade1c513e
-
SHA256
bc11ed1eee97486bfcb63cdbeda0ae72110f1a6a130c62f73ea99b7fc17150f8
-
SHA512
70a79e51801331ab31fec35759cdc7649e53d22aa41d00cf3be631d86f36cf7d407c8bac53e5f1b77e5a7c06acef4beda3956fd6d09077b99dbe1834590fff07
-
SSDEEP
1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalDSh:1nK6a+qdOOtEvwDpjD
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\Control Panel\International\Geo\Nation 4853d5e2bc6e90exeexeexeex.exe -
Executes dropped EXE 1 IoCs
pid Process 3800 asih.exe -
resource yara_rule behavioral2/memory/3152-133-0x0000000000500000-0x000000000050F311-memory.dmp upx behavioral2/files/0x00080000000231e7-145.dat upx behavioral2/files/0x00080000000231e7-147.dat upx behavioral2/memory/3152-149-0x0000000000500000-0x000000000050F311-memory.dmp upx behavioral2/files/0x00080000000231e7-148.dat upx behavioral2/memory/3800-157-0x0000000000500000-0x000000000050F311-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3152 wrote to memory of 3800 3152 4853d5e2bc6e90exeexeexeex.exe 84 PID 3152 wrote to memory of 3800 3152 4853d5e2bc6e90exeexeexeex.exe 84 PID 3152 wrote to memory of 3800 3152 4853d5e2bc6e90exeexeexeex.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\4853d5e2bc6e90exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\4853d5e2bc6e90exeexeexeex.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:3800
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
75KB
MD5be18888b86a040cb2f62ada4a012674a
SHA18a150a9d0b15bd2a623eab0eaf85b53f709af141
SHA2568a03aea35c3f5886eda902ba962a372e3a1193a5ee1f0417434139a05f6b066b
SHA5125309a2c8591d455564d3e78e6ca3ab30e0373d94f6029b59421981c13e568438ae18828ec36ad2a55da1b9ccd08d5497275606a537624361080e349e2d21c519
-
Filesize
75KB
MD5be18888b86a040cb2f62ada4a012674a
SHA18a150a9d0b15bd2a623eab0eaf85b53f709af141
SHA2568a03aea35c3f5886eda902ba962a372e3a1193a5ee1f0417434139a05f6b066b
SHA5125309a2c8591d455564d3e78e6ca3ab30e0373d94f6029b59421981c13e568438ae18828ec36ad2a55da1b9ccd08d5497275606a537624361080e349e2d21c519
-
Filesize
75KB
MD5be18888b86a040cb2f62ada4a012674a
SHA18a150a9d0b15bd2a623eab0eaf85b53f709af141
SHA2568a03aea35c3f5886eda902ba962a372e3a1193a5ee1f0417434139a05f6b066b
SHA5125309a2c8591d455564d3e78e6ca3ab30e0373d94f6029b59421981c13e568438ae18828ec36ad2a55da1b9ccd08d5497275606a537624361080e349e2d21c519