Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/07/2023, 03:19

General

  • Target

    4f377ae263afa67a577913ba6211b0470f85eedb54e6abbdf2fb31492d629166.exe

  • Size

    2.0MB

  • MD5

    ecd1031b78fee2caa4b68d0abdf8fcdf

  • SHA1

    f523ca4b8868c35c85ed5aa31b33a2348b57636b

  • SHA256

    4f377ae263afa67a577913ba6211b0470f85eedb54e6abbdf2fb31492d629166

  • SHA512

    8f690b6c3603089a049bec559dc23fbee227b7ab54876491a137f22e603f20ef1cb36b8055e707574a3e8402cfce1364e8016d959c0b3288777793f3a48bbdb0

  • SSDEEP

    49152:2WhlHLBfJXAE9XM+s/ChcuRT+5bN5knbQX/BCJkr88T2f:2WhlrBfKEQ/aZ25UQXAkw7

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4f377ae263afa67a577913ba6211b0470f85eedb54e6abbdf2fb31492d629166.exe
    "C:\Users\Admin\AppData\Local\Temp\4f377ae263afa67a577913ba6211b0470f85eedb54e6abbdf2fb31492d629166.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1896
    • C:\Windows\SysWOW64\msiexec.exe
      "C:\Windows\System32\msiexec.exe" /y .\NRzRTX6N.na
      2⤵
      • Loads dropped DLL
      PID:780

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\NRzRTX6N.na

    Filesize

    1.3MB

    MD5

    859b6be077ff6384f8404e667b6fccbf

    SHA1

    00908039e3906b066e2a68ded4a7c11b61fde70a

    SHA256

    b5291cafccb9860693507f9cc92d4588790936d3dbdab9f72e277549cf9fb432

    SHA512

    de53c792839149d28667f38d03df59bbf50f38f8114cebe353d26510bed1f006839feca0c16c13ba9f1a93989ee8e3fc18378aced6c993bb0e64f64b09d3968c

  • C:\Users\Admin\AppData\Local\Temp\NrzRTX6N.na

    Filesize

    1.3MB

    MD5

    859b6be077ff6384f8404e667b6fccbf

    SHA1

    00908039e3906b066e2a68ded4a7c11b61fde70a

    SHA256

    b5291cafccb9860693507f9cc92d4588790936d3dbdab9f72e277549cf9fb432

    SHA512

    de53c792839149d28667f38d03df59bbf50f38f8114cebe353d26510bed1f006839feca0c16c13ba9f1a93989ee8e3fc18378aced6c993bb0e64f64b09d3968c

  • memory/780-137-0x0000000001620000-0x0000000001626000-memory.dmp

    Filesize

    24KB

  • memory/780-138-0x0000000000400000-0x000000000054D000-memory.dmp

    Filesize

    1.3MB

  • memory/780-140-0x0000000003490000-0x00000000035AE000-memory.dmp

    Filesize

    1.1MB

  • memory/780-141-0x00000000035B0000-0x00000000036B1000-memory.dmp

    Filesize

    1.0MB

  • memory/780-144-0x00000000035B0000-0x00000000036B1000-memory.dmp

    Filesize

    1.0MB

  • memory/780-145-0x00000000035B0000-0x00000000036B1000-memory.dmp

    Filesize

    1.0MB