Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/07/2023, 20:24

General

  • Target

    582259ee5205a7exeexeexeex.exe

  • Size

    327KB

  • MD5

    582259ee5205a7660365641435af7913

  • SHA1

    d8f02441b2d3863bf6121d57f2329864ebf3cebe

  • SHA256

    6628f465aa8dd1128289e7b62f290484dd89996ff935f5a6b6cf67103c906bd2

  • SHA512

    145b652b01c3cd9f1825c5855f0c529b9b3d47f4baa6fe08db0c03a5f8bb3686d031e4e89ab0770cf5f2e06f22ca7ac244dc6c2d1e616c486b0a98a0bbd8b581

  • SSDEEP

    6144:g2+JS2sFafI8U0obHCW/2a7XQcsPMjVWrG8KgbPzDh:g2TFafJiHCWBWPMjVWrXK0

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 30 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\582259ee5205a7exeexeexeex.exe
    "C:\Users\Admin\AppData\Local\Temp\582259ee5205a7exeexeexeex.exe"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4068
    • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\dwmsys.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\dwmsys.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\dwmsys.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1136
      • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\dwmsys.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\dwmsys.exe"
        3⤵
        • Executes dropped EXE
        PID:1968

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\dwmsys.exe

    Filesize

    327KB

    MD5

    b8a5ceaaccf1fa60849754d66b3e9f46

    SHA1

    ea36073aea25f3ce50add965360c1bd425f000bd

    SHA256

    7396401c2b44f21579185588ee32b8d2bf1d4e5220c7ae353c04f8256ce0babd

    SHA512

    b8124a9a185d20fa02c3385fd12d0b6c84b8214f128ce69cf18f5683a1381bfca6c9519670db1c48282c2aaff8e53e61a981226ea785edfbbff92ab16960b56c

  • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\dwmsys.exe

    Filesize

    327KB

    MD5

    b8a5ceaaccf1fa60849754d66b3e9f46

    SHA1

    ea36073aea25f3ce50add965360c1bd425f000bd

    SHA256

    7396401c2b44f21579185588ee32b8d2bf1d4e5220c7ae353c04f8256ce0babd

    SHA512

    b8124a9a185d20fa02c3385fd12d0b6c84b8214f128ce69cf18f5683a1381bfca6c9519670db1c48282c2aaff8e53e61a981226ea785edfbbff92ab16960b56c

  • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\dwmsys.exe

    Filesize

    327KB

    MD5

    b8a5ceaaccf1fa60849754d66b3e9f46

    SHA1

    ea36073aea25f3ce50add965360c1bd425f000bd

    SHA256

    7396401c2b44f21579185588ee32b8d2bf1d4e5220c7ae353c04f8256ce0babd

    SHA512

    b8124a9a185d20fa02c3385fd12d0b6c84b8214f128ce69cf18f5683a1381bfca6c9519670db1c48282c2aaff8e53e61a981226ea785edfbbff92ab16960b56c

  • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\dwmsys.exe

    Filesize

    327KB

    MD5

    b8a5ceaaccf1fa60849754d66b3e9f46

    SHA1

    ea36073aea25f3ce50add965360c1bd425f000bd

    SHA256

    7396401c2b44f21579185588ee32b8d2bf1d4e5220c7ae353c04f8256ce0babd

    SHA512

    b8124a9a185d20fa02c3385fd12d0b6c84b8214f128ce69cf18f5683a1381bfca6c9519670db1c48282c2aaff8e53e61a981226ea785edfbbff92ab16960b56c