Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230831-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/09/2023, 02:00

General

  • Target

    393eb11a27b9c660a584855d4d11a476c4be5ab22a0b9d2eaffd0b5775763bbb.exe

  • Size

    2.3MB

  • MD5

    0463027aa677db05387ed018c0794f15

  • SHA1

    bef5e3e641514cd82a2661ebec30050c4b85896b

  • SHA256

    393eb11a27b9c660a584855d4d11a476c4be5ab22a0b9d2eaffd0b5775763bbb

  • SHA512

    3c87e3c75e184f69e8960bdeb47c346b0b45a4004273221a2c51c1dc80901d2a38795f39774bc6044f4f48bc10ae100370350bbb6f6fd2f7b36b5ef9a85a3553

  • SSDEEP

    49152:mDkUrjCHD1VTq/m61J8kw7ly1/3lHkw3DuuT0XXWJXv6:m4Uij1VTq/d1J8kw7EP9Fau396

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\393eb11a27b9c660a584855d4d11a476c4be5ab22a0b9d2eaffd0b5775763bbb.exe
    "C:\Users\Admin\AppData\Local\Temp\393eb11a27b9c660a584855d4d11a476c4be5ab22a0b9d2eaffd0b5775763bbb.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3300
    • C:\Windows\SysWOW64\regsvr32.exe
      "C:\Windows\System32\regsvr32.exe" -u N9W0Q1VQ.L7A -s
      2⤵
      • Loads dropped DLL
      PID:2320

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\N9W0Q1VQ.L7A

    Filesize

    2.1MB

    MD5

    ead3158678a8ce31553e8d744a54f584

    SHA1

    678275f0b31eef46e3ce77ac86a4001c45d8a0ae

    SHA256

    600e17d5ae4aad1d13d50241b1e6c06e0b1357512de242bef7f1c802c0924f4c

    SHA512

    3c61a4d727395b42524257174041e64c8d79cfea87d47a94f341cfa49e0e6bb2548cbfa46adbb8074afaae691861346e6a443ac502ae6cbd791e1369bb85f65e

  • C:\Users\Admin\AppData\Local\Temp\N9w0q1VQ.l7a

    Filesize

    2.1MB

    MD5

    ead3158678a8ce31553e8d744a54f584

    SHA1

    678275f0b31eef46e3ce77ac86a4001c45d8a0ae

    SHA256

    600e17d5ae4aad1d13d50241b1e6c06e0b1357512de242bef7f1c802c0924f4c

    SHA512

    3c61a4d727395b42524257174041e64c8d79cfea87d47a94f341cfa49e0e6bb2548cbfa46adbb8074afaae691861346e6a443ac502ae6cbd791e1369bb85f65e

  • C:\Users\Admin\AppData\Local\Temp\N9w0q1VQ.l7a

    Filesize

    2.1MB

    MD5

    ead3158678a8ce31553e8d744a54f584

    SHA1

    678275f0b31eef46e3ce77ac86a4001c45d8a0ae

    SHA256

    600e17d5ae4aad1d13d50241b1e6c06e0b1357512de242bef7f1c802c0924f4c

    SHA512

    3c61a4d727395b42524257174041e64c8d79cfea87d47a94f341cfa49e0e6bb2548cbfa46adbb8074afaae691861346e6a443ac502ae6cbd791e1369bb85f65e

  • memory/2320-5-0x00000000028F0000-0x0000000002B16000-memory.dmp

    Filesize

    2.1MB

  • memory/2320-6-0x00000000009D0000-0x00000000009D6000-memory.dmp

    Filesize

    24KB

  • memory/2320-7-0x00000000028F0000-0x0000000002B16000-memory.dmp

    Filesize

    2.1MB

  • memory/2320-10-0x0000000002E50000-0x0000000002F60000-memory.dmp

    Filesize

    1.1MB

  • memory/2320-11-0x0000000002F60000-0x0000000003056000-memory.dmp

    Filesize

    984KB

  • memory/2320-14-0x0000000002F60000-0x0000000003056000-memory.dmp

    Filesize

    984KB

  • memory/2320-15-0x0000000002F60000-0x0000000003056000-memory.dmp

    Filesize

    984KB