Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
10/07/2023, 18:43
Behavioral task
behavioral1
Sample
dd56b0bd285655exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
dd56b0bd285655exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
dd56b0bd285655exeexeexeex.exe
-
Size
90KB
-
MD5
dd56b0bd285655a8c1495268c9957491
-
SHA1
b32f82a5217c12d87d783b48a67c634c3d337089
-
SHA256
27c288540af295395fbaa8006cda9f1691f7eabccb5c92f318160a071fb7ea2c
-
SHA512
5af9f5388da1bc9def3a1384777ddaff12edc1001622e7ae98549587ebc203fb11f4285140ad5242309290efd3d156cba1cf27e1b3f1f4a7ae4db4c475083a7c
-
SSDEEP
1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpMx75j:AnBdOOtEvwDpj6z5j
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\Control Panel\International\Geo\Nation dd56b0bd285655exeexeexeex.exe -
Executes dropped EXE 1 IoCs
pid Process 4068 asih.exe -
resource yara_rule behavioral2/memory/2812-141-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral2/files/0x000800000002325e-145.dat upx behavioral2/files/0x000800000002325e-147.dat upx behavioral2/files/0x000800000002325e-148.dat upx behavioral2/memory/4068-157-0x0000000000500000-0x000000000050F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2812 wrote to memory of 4068 2812 dd56b0bd285655exeexeexeex.exe 85 PID 2812 wrote to memory of 4068 2812 dd56b0bd285655exeexeexeex.exe 85 PID 2812 wrote to memory of 4068 2812 dd56b0bd285655exeexeexeex.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\dd56b0bd285655exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\dd56b0bd285655exeexeexeex.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:4068
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90KB
MD55ee153bfd6dbfcd7fc055d271865fce0
SHA16b125375f2678ed5239b0854fe5a853400e3e5fc
SHA2569fb1865a3eb1286b8a924c425a31f23f099a0ac9f912beebdf56a76c1533fa7e
SHA5124883471f6f2532d67cff65126154a38c50898994aacdb16beaef63c76ba1b4e9cecf8365c932098b13e8d714a0e9b38e3aa5848379ba13cdc07e597f5f829d63
-
Filesize
90KB
MD55ee153bfd6dbfcd7fc055d271865fce0
SHA16b125375f2678ed5239b0854fe5a853400e3e5fc
SHA2569fb1865a3eb1286b8a924c425a31f23f099a0ac9f912beebdf56a76c1533fa7e
SHA5124883471f6f2532d67cff65126154a38c50898994aacdb16beaef63c76ba1b4e9cecf8365c932098b13e8d714a0e9b38e3aa5848379ba13cdc07e597f5f829d63
-
Filesize
90KB
MD55ee153bfd6dbfcd7fc055d271865fce0
SHA16b125375f2678ed5239b0854fe5a853400e3e5fc
SHA2569fb1865a3eb1286b8a924c425a31f23f099a0ac9f912beebdf56a76c1533fa7e
SHA5124883471f6f2532d67cff65126154a38c50898994aacdb16beaef63c76ba1b4e9cecf8365c932098b13e8d714a0e9b38e3aa5848379ba13cdc07e597f5f829d63