Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
127s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
30/09/2023, 13:47
Static task
static1
Behavioral task
behavioral1
Sample
a408fae89beb305031cdec692e4c4040_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
a408fae89beb305031cdec692e4c4040_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
a408fae89beb305031cdec692e4c4040_JC.exe
-
Size
12KB
-
MD5
a408fae89beb305031cdec692e4c4040
-
SHA1
e1a1392080f430c66cac3ceb120480f9e0b0eef0
-
SHA256
b60a89c3a5ca0ea22716c26cf0c4bf0f6a03a728bacaf1ca3ed1ca53302c9757
-
SHA512
5f6025b007f0a0a7de366a35cbf39c1d6a5eedde5f50824589765539e7c220a8fe5088729de070ce0a57f90c3eccc333c58351da09dde85005f96d00cbb02246
-
SSDEEP
96:tXLMBY1T/14cfnp3bYko+vIIFp4cawv2yI7zypwptzzW5mYbaJfdTwIdDbRVQYdC:xZCYprzoFhmUdNbRV1dZdmGLtW5ePIdt
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation a408fae89beb305031cdec692e4c4040_JC.exe Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation kgfdfjdk.exe -
Executes dropped EXE 1 IoCs
pid Process 3204 kgfdfjdk.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4028 wrote to memory of 3204 4028 a408fae89beb305031cdec692e4c4040_JC.exe 86 PID 4028 wrote to memory of 3204 4028 a408fae89beb305031cdec692e4c4040_JC.exe 86 PID 4028 wrote to memory of 3204 4028 a408fae89beb305031cdec692e4c4040_JC.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\a408fae89beb305031cdec692e4c4040_JC.exe"C:\Users\Admin\AppData\Local\Temp\a408fae89beb305031cdec692e4c4040_JC.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Users\Admin\AppData\Local\Temp\kgfdfjdk.exe"C:\Users\Admin\AppData\Local\Temp\kgfdfjdk.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:3204
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13KB
MD52c9f9ae9fce8ef1af1e14fb2389e0893
SHA18382d37e2a21c23d37326ba973e8ed542dfcaec4
SHA25646a2bf280f0f4a5ba067142a1ced5ebee9ef1531b0aaef191c5e1214dc1c854d
SHA5124c555167c9fc99b2b332d49207510e285a591d9833f30b4f93a25605c61159a022cbc3e6dadd7ec13aa45f9fd27be5752a1362aefef45a0c4dee9af539e129c8
-
Filesize
13KB
MD52c9f9ae9fce8ef1af1e14fb2389e0893
SHA18382d37e2a21c23d37326ba973e8ed542dfcaec4
SHA25646a2bf280f0f4a5ba067142a1ced5ebee9ef1531b0aaef191c5e1214dc1c854d
SHA5124c555167c9fc99b2b332d49207510e285a591d9833f30b4f93a25605c61159a022cbc3e6dadd7ec13aa45f9fd27be5752a1362aefef45a0c4dee9af539e129c8
-
Filesize
13KB
MD52c9f9ae9fce8ef1af1e14fb2389e0893
SHA18382d37e2a21c23d37326ba973e8ed542dfcaec4
SHA25646a2bf280f0f4a5ba067142a1ced5ebee9ef1531b0aaef191c5e1214dc1c854d
SHA5124c555167c9fc99b2b332d49207510e285a591d9833f30b4f93a25605c61159a022cbc3e6dadd7ec13aa45f9fd27be5752a1362aefef45a0c4dee9af539e129c8