Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
08/07/2023, 09:48
Behavioral task
behavioral1
Sample
694d7f8ec0f10cexeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
694d7f8ec0f10cexeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
694d7f8ec0f10cexeexeexeex.exe
-
Size
117KB
-
MD5
694d7f8ec0f10caa9f6c82c26a92c5d1
-
SHA1
d8c8a9041f052ff63ed7046de9f6ca7d56dc6787
-
SHA256
9d1443fa0e0982b01619aa67082835911a87f3f2a4be5772bc889d5666d5f422
-
SHA512
d054be82adbd751869f7b1d62024a42e14313eca74baa134dc7dbcfcc4ebeb29c6d1ea7d36a74f41e4f62dacc6ed39ee539e8a2d20c41a067afb1a3bfa82bfa4
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgp699G/TG4dY2:AnBdOOtEvwDpj6zU
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\Control Panel\International\Geo\Nation 694d7f8ec0f10cexeexeexeex.exe -
Executes dropped EXE 1 IoCs
pid Process 4756 asih.exe -
resource yara_rule behavioral2/memory/1464-141-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral2/files/0x000900000002320f-145.dat upx behavioral2/files/0x000900000002320f-147.dat upx behavioral2/files/0x000900000002320f-148.dat upx behavioral2/memory/4756-157-0x0000000000500000-0x000000000050F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1464 wrote to memory of 4756 1464 694d7f8ec0f10cexeexeexeex.exe 85 PID 1464 wrote to memory of 4756 1464 694d7f8ec0f10cexeexeexeex.exe 85 PID 1464 wrote to memory of 4756 1464 694d7f8ec0f10cexeexeexeex.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\694d7f8ec0f10cexeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\694d7f8ec0f10cexeexeexeex.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:4756
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
117KB
MD5587ed3f330ec6ce74e325dd8142c03ac
SHA1216b5659e8ec1d25df3b6556f902f4b67cef42e6
SHA256835991a0d8cf430585407156ae68fe029161f21355b715c7d2f00130a203036b
SHA5129e26c38287becac34f1069b49eb113d081d9a9f1f6e1cda126db47d00016d7b70f770394ea68e479a7c3ad0c570a90cdb3e907ffa17f3fbfe74c761739d62def
-
Filesize
117KB
MD5587ed3f330ec6ce74e325dd8142c03ac
SHA1216b5659e8ec1d25df3b6556f902f4b67cef42e6
SHA256835991a0d8cf430585407156ae68fe029161f21355b715c7d2f00130a203036b
SHA5129e26c38287becac34f1069b49eb113d081d9a9f1f6e1cda126db47d00016d7b70f770394ea68e479a7c3ad0c570a90cdb3e907ffa17f3fbfe74c761739d62def
-
Filesize
117KB
MD5587ed3f330ec6ce74e325dd8142c03ac
SHA1216b5659e8ec1d25df3b6556f902f4b67cef42e6
SHA256835991a0d8cf430585407156ae68fe029161f21355b715c7d2f00130a203036b
SHA5129e26c38287becac34f1069b49eb113d081d9a9f1f6e1cda126db47d00016d7b70f770394ea68e479a7c3ad0c570a90cdb3e907ffa17f3fbfe74c761739d62def