Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/07/2023, 14:55

General

  • Target

    cad7c87b37b11eexeexeexeex.exe

  • Size

    57KB

  • MD5

    cad7c87b37b11e7a8aaad1c710864da5

  • SHA1

    04879197e6c53bb79306972591cd443b1be3c3b5

  • SHA256

    107368ac619dc37c809cceb4954cc4f019cd0f87ed68b7dacb324556d5c0b681

  • SHA512

    525713f0a5ff9d98e035645f69e7edcbb04ff75929cc66bbe3868f8720966b7612d66249e9d1f9de9e5d9dbef4011b38c27cc045e9a9fd3e0aa4f5eba436b69a

  • SSDEEP

    1536:X6QFElP6n+gJQMOtEvwDpjBccD2RuoNmuBLZn7Y:X6a+SOtEvwDpjBrOU

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cad7c87b37b11eexeexeexeex.exe
    "C:\Users\Admin\AppData\Local\Temp\cad7c87b37b11eexeexeexeex.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1348
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:3772

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    57KB

    MD5

    f0857c82ba27770d3a87de8439dbf695

    SHA1

    2cc929ad5e48a5f10838aaee3bd9ac73ebb8dfd0

    SHA256

    226f0d062da830fbf675a51870e7be9f58985b5982ef7550628a6a24c0503307

    SHA512

    95aa0b3ead0859a255a500d7fa7c2b8948bf1d6fd97c63474f24fd8664332c18094a9a7e728f2a5085fbdf5285abb24581e3514977d6bd4fea8c214ab7b78c9f

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    57KB

    MD5

    f0857c82ba27770d3a87de8439dbf695

    SHA1

    2cc929ad5e48a5f10838aaee3bd9ac73ebb8dfd0

    SHA256

    226f0d062da830fbf675a51870e7be9f58985b5982ef7550628a6a24c0503307

    SHA512

    95aa0b3ead0859a255a500d7fa7c2b8948bf1d6fd97c63474f24fd8664332c18094a9a7e728f2a5085fbdf5285abb24581e3514977d6bd4fea8c214ab7b78c9f

  • C:\Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    57KB

    MD5

    f0857c82ba27770d3a87de8439dbf695

    SHA1

    2cc929ad5e48a5f10838aaee3bd9ac73ebb8dfd0

    SHA256

    226f0d062da830fbf675a51870e7be9f58985b5982ef7550628a6a24c0503307

    SHA512

    95aa0b3ead0859a255a500d7fa7c2b8948bf1d6fd97c63474f24fd8664332c18094a9a7e728f2a5085fbdf5285abb24581e3514977d6bd4fea8c214ab7b78c9f

  • memory/1348-133-0x00000000005E0000-0x00000000005E6000-memory.dmp

    Filesize

    24KB

  • memory/1348-134-0x0000000000600000-0x0000000000606000-memory.dmp

    Filesize

    24KB

  • memory/3772-149-0x00000000006B0000-0x00000000006B6000-memory.dmp

    Filesize

    24KB