Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
22/07/2023, 03:19
Static task
static1
Behavioral task
behavioral1
Sample
4f377ae263afa67a577913ba6211b0470f85eedb54e6abbdf2fb31492d629166.exe
Resource
win10v2004-20230703-en
General
-
Target
4f377ae263afa67a577913ba6211b0470f85eedb54e6abbdf2fb31492d629166.exe
-
Size
2.0MB
-
MD5
ecd1031b78fee2caa4b68d0abdf8fcdf
-
SHA1
f523ca4b8868c35c85ed5aa31b33a2348b57636b
-
SHA256
4f377ae263afa67a577913ba6211b0470f85eedb54e6abbdf2fb31492d629166
-
SHA512
8f690b6c3603089a049bec559dc23fbee227b7ab54876491a137f22e603f20ef1cb36b8055e707574a3e8402cfce1364e8016d959c0b3288777793f3a48bbdb0
-
SSDEEP
49152:2WhlHLBfJXAE9XM+s/ChcuRT+5bN5knbQX/BCJkr88T2f:2WhlrBfKEQ/aZ25UQXAkw7
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\Control Panel\International\Geo\Nation 4f377ae263afa67a577913ba6211b0470f85eedb54e6abbdf2fb31492d629166.exe -
Loads dropped DLL 1 IoCs
pid Process 780 msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1896 wrote to memory of 780 1896 4f377ae263afa67a577913ba6211b0470f85eedb54e6abbdf2fb31492d629166.exe 85 PID 1896 wrote to memory of 780 1896 4f377ae263afa67a577913ba6211b0470f85eedb54e6abbdf2fb31492d629166.exe 85 PID 1896 wrote to memory of 780 1896 4f377ae263afa67a577913ba6211b0470f85eedb54e6abbdf2fb31492d629166.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f377ae263afa67a577913ba6211b0470f85eedb54e6abbdf2fb31492d629166.exe"C:\Users\Admin\AppData\Local\Temp\4f377ae263afa67a577913ba6211b0470f85eedb54e6abbdf2fb31492d629166.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\System32\msiexec.exe" /y .\NRzRTX6N.na2⤵
- Loads dropped DLL
PID:780
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5859b6be077ff6384f8404e667b6fccbf
SHA100908039e3906b066e2a68ded4a7c11b61fde70a
SHA256b5291cafccb9860693507f9cc92d4588790936d3dbdab9f72e277549cf9fb432
SHA512de53c792839149d28667f38d03df59bbf50f38f8114cebe353d26510bed1f006839feca0c16c13ba9f1a93989ee8e3fc18378aced6c993bb0e64f64b09d3968c
-
Filesize
1.3MB
MD5859b6be077ff6384f8404e667b6fccbf
SHA100908039e3906b066e2a68ded4a7c11b61fde70a
SHA256b5291cafccb9860693507f9cc92d4588790936d3dbdab9f72e277549cf9fb432
SHA512de53c792839149d28667f38d03df59bbf50f38f8114cebe353d26510bed1f006839feca0c16c13ba9f1a93989ee8e3fc18378aced6c993bb0e64f64b09d3968c