Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
23/09/2023, 07:52
Static task
static1
Behavioral task
behavioral1
Sample
DCF1.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
DCF1.exe
Resource
win10v2004-20230915-en
General
-
Target
DCF1.exe
-
Size
632KB
-
MD5
e4b764b4444d025108f9bb076b3e4031
-
SHA1
c48f779c7aa1232b6d58171fe30e28d675ea58dd
-
SHA256
44b0862d3846b57ad386272911e6016fbf9bc93750e2dc9aa292eb949ba2b866
-
SHA512
cc754008a68a40f9a3ed271a065250edf9a7aa60c86bd0b726c06601360b2725ed5283569f4c0ce08da5220b9b839d28b1a5a1eddae9ff92cca467de1e01bc7e
-
SSDEEP
12288:fCs1IG+Hdsy7Mf3ysEMftONnz7vXWIT71z6d:fQG+HdsAM/uMFWDWIT7p6d
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\Control Panel\International\Geo\Nation cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4120 cmd.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 220 wrote to memory of 4120 220 DCF1.exe 86 PID 220 wrote to memory of 4120 220 DCF1.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\DCF1.exe"C:\Users\Admin\AppData\Local\Temp\DCF1.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c embedded.exe2⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
PID:4120
-