Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/10/2023, 10:22

General

  • Target

    392ba9e4a216b0e687846948bcee727914ae2a91580d0ed7d9b6ab749b3418d3.exe

  • Size

    1.5MB

  • MD5

    56f5fc19dcac0ad3e025a1a70de8a134

  • SHA1

    9074a465e9ecaea11e424169e73708618cdfc651

  • SHA256

    392ba9e4a216b0e687846948bcee727914ae2a91580d0ed7d9b6ab749b3418d3

  • SHA512

    3dfc8369ae513affdf0c371340022183e360432b5de1e38a5904bc552e19e175e90c8861b45f9ba799d17ad31439dcd51fa0705dff892c74c617519ff2765e9a

  • SSDEEP

    24576:NWFf9wwXe8UBH9iT6hbuZ3SuLCxfu4eyEMrOLabNZ5muy5Az6U4hfM1wWqJG3J:NQf9wwXe8eqLqflEM2ywC+U4hwuS

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\392ba9e4a216b0e687846948bcee727914ae2a91580d0ed7d9b6ab749b3418d3.exe
    "C:\Users\Admin\AppData\Local\Temp\392ba9e4a216b0e687846948bcee727914ae2a91580d0ed7d9b6ab749b3418d3.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4736
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c del C:\Users\Admin\AppData\Local\Temp\1696731759.zip
      2⤵
        PID:2612
      • C:\Users\Admin\AppData\Local\Temp\µãλÆ÷1.2.exe
        "C:\Users\Admin\AppData\Local\Temp\µãλÆ÷1.2.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:1892

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\0DA515F703BB9B49479E8697ADB0B955_96EEC010953ED454BBCDFA69FC071E7C

      Filesize

      1KB

      MD5

      1ba04bdcb661cdd399f94c62e5bf9a48

      SHA1

      20ab80de61825c1004cb22d77a5dceb360d4516f

      SHA256

      baa71234d197059baa966cdcba90540128f408e7e65d9f3eb5efabb037360c0b

      SHA512

      41b208d79eebd14fcd0fc1a7489b2782569668606f3bb2114fda07cbbe1730fdf73131f734cf6ab8d56b697eb396579696d563f948a2cd5aae2b62657b99aca3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\4B3D1CD03E2BE9D4F9CDDE390F5EFE31_287BE23B7EA864C953D17EFAF5804874

      Filesize

      1KB

      MD5

      5a8d9f61219d909ccd7dfd4e96b3972d

      SHA1

      cf4330b47c5e69cac8114323fc36e50991be90c2

      SHA256

      1587238ec70b8b737480e75811a0036abb04fc9340531ad8558f4d884697b35d

      SHA512

      5a81de82247749c8ee715d5b1064ec0329f4fed088d2832ff143ea318ca012c19f55e208dc45f7829bf716013336a5baa9d4afdc495e8d2afdc8e1ddfd162632

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0DA515F703BB9B49479E8697ADB0B955_96EEC010953ED454BBCDFA69FC071E7C

      Filesize

      516B

      MD5

      abd24b982bd7f572c1814740aaf07910

      SHA1

      e6dacf20eb8d2b0e7f9131c33027b2d7ab6b20c6

      SHA256

      ba1ed3f0d9da37962de53d10c96d88e9a4669307744363c1b97a8a0ae65a1edd

      SHA512

      f05162d462bbfe9856263ed7715c9f82629ea09666a8959cec25659b53d4811d3584f74ac696d9c4f72ca990aadf87f9b22c624e79e9449d9bdad043465be9d4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\4B3D1CD03E2BE9D4F9CDDE390F5EFE31_287BE23B7EA864C953D17EFAF5804874

      Filesize

      528B

      MD5

      ff5b5a77d17808b152c24bafd20cde5f

      SHA1

      e9fed5ae8fb6fe8af41c0ca9b4842a2e747ffa99

      SHA256

      a4a6f0fb02ad28a62eef7e1bf6cca6789631330fe137e17300ac32cde908fd22

      SHA512

      c96986f59427dd038947d1e291841215eba66f275e350c2aebcbc81e95e820cbd6075e02a2e67d25ccf5c2ca10ff7bb9410e695ebde5e8401c1564b3e6227df7

    • C:\Users\Admin\AppData\Local\Temp\µãλÆ÷1.2.exe

      Filesize

      1.6MB

      MD5

      be9bd1c43152424a69d5c0c1e0cda09f

      SHA1

      99044ab3b6d45a9d4d3166a2948e2584e27c1ed8

      SHA256

      5234385c361f337f229be8209e6f42d7622ab229687b79b24019ed16d39372ac

      SHA512

      7e8f0274ccbf26f1813afe55a26fdae48fe9f3e239fb0b80e706aef393fa05da9c540d9b40cf1d30002a53015f55dcaaedeb2314e5ed94ea81dcc47a2cda97fc

    • C:\Users\Admin\AppData\Local\Temp\µãλÆ÷1.2.exe

      Filesize

      1.6MB

      MD5

      be9bd1c43152424a69d5c0c1e0cda09f

      SHA1

      99044ab3b6d45a9d4d3166a2948e2584e27c1ed8

      SHA256

      5234385c361f337f229be8209e6f42d7622ab229687b79b24019ed16d39372ac

      SHA512

      7e8f0274ccbf26f1813afe55a26fdae48fe9f3e239fb0b80e706aef393fa05da9c540d9b40cf1d30002a53015f55dcaaedeb2314e5ed94ea81dcc47a2cda97fc

    • C:\Users\Admin\AppData\Local\Temp\µãλÆ÷1.2.exe

      Filesize

      1.6MB

      MD5

      be9bd1c43152424a69d5c0c1e0cda09f

      SHA1

      99044ab3b6d45a9d4d3166a2948e2584e27c1ed8

      SHA256

      5234385c361f337f229be8209e6f42d7622ab229687b79b24019ed16d39372ac

      SHA512

      7e8f0274ccbf26f1813afe55a26fdae48fe9f3e239fb0b80e706aef393fa05da9c540d9b40cf1d30002a53015f55dcaaedeb2314e5ed94ea81dcc47a2cda97fc

    • memory/1892-21-0x0000000010000000-0x0000000010059000-memory.dmp

      Filesize

      356KB

    • memory/4736-0-0x0000000010000000-0x0000000010059000-memory.dmp

      Filesize

      356KB