Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
08/07/2023, 09:32
Behavioral task
behavioral1
Sample
67421a0c0f8486exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
67421a0c0f8486exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
67421a0c0f8486exeexeexeex.exe
-
Size
110KB
-
MD5
67421a0c0f84863fdc4c5620f9a5ab79
-
SHA1
e8d9959802011c4326bb4c652020601d6bb3508d
-
SHA256
8d3f7875dcbf7a5b7ce745c5a510dc3f376858f2eca89189f8304a95d9319d2c
-
SHA512
028e5088a4cf9e8ca17716efe352ef7fe47900abb5a4f23d294cdad3710aaee9141883cf861f852360b8dbe2fedd241afcf7878931ebaafd5c99ef69860151e4
-
SSDEEP
1536:T6QFElP6n+gxmddpMOtEvwDpjCGYQbN/PKwNeRVp3:T6a+rdOOtEvwDpjLzIp
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\Control Panel\International\Geo\Nation 67421a0c0f8486exeexeexeex.exe -
Executes dropped EXE 1 IoCs
pid Process 5052 asih.exe -
resource yara_rule behavioral2/memory/4728-141-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/files/0x0008000000023204-145.dat upx behavioral2/files/0x0008000000023204-147.dat upx behavioral2/files/0x0008000000023204-148.dat upx behavioral2/memory/5052-156-0x0000000000500000-0x0000000000510000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4728 wrote to memory of 5052 4728 67421a0c0f8486exeexeexeex.exe 84 PID 4728 wrote to memory of 5052 4728 67421a0c0f8486exeexeexeex.exe 84 PID 4728 wrote to memory of 5052 4728 67421a0c0f8486exeexeexeex.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\67421a0c0f8486exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\67421a0c0f8486exeexeexeex.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:5052
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
110KB
MD5419799fc7f6ad2de9a5b969615d79205
SHA15a64b23c92b4ca569a2a6397b957ccc43f8d8b57
SHA256d87cac12f08bfc4953373198cf22316561087d0cff2c22df3616663bd06bf1e0
SHA512742c506fba77a3875cbf3d22a836db17191fb41849dd0e3e1437f1a4545270a7a963d60e87f123b932b5f97013817275fb51fd38d84039687b087de2f4626c64
-
Filesize
110KB
MD5419799fc7f6ad2de9a5b969615d79205
SHA15a64b23c92b4ca569a2a6397b957ccc43f8d8b57
SHA256d87cac12f08bfc4953373198cf22316561087d0cff2c22df3616663bd06bf1e0
SHA512742c506fba77a3875cbf3d22a836db17191fb41849dd0e3e1437f1a4545270a7a963d60e87f123b932b5f97013817275fb51fd38d84039687b087de2f4626c64
-
Filesize
110KB
MD5419799fc7f6ad2de9a5b969615d79205
SHA15a64b23c92b4ca569a2a6397b957ccc43f8d8b57
SHA256d87cac12f08bfc4953373198cf22316561087d0cff2c22df3616663bd06bf1e0
SHA512742c506fba77a3875cbf3d22a836db17191fb41849dd0e3e1437f1a4545270a7a963d60e87f123b932b5f97013817275fb51fd38d84039687b087de2f4626c64