Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2023, 01:10
Static task
static1
Behavioral task
behavioral1
Sample
bc8a042d1b77efec281dcc1f7653165e2e8218e6ef0dc225571aef6c664a73ae.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
bc8a042d1b77efec281dcc1f7653165e2e8218e6ef0dc225571aef6c664a73ae.exe
Resource
win10v2004-20230915-en
General
-
Target
bc8a042d1b77efec281dcc1f7653165e2e8218e6ef0dc225571aef6c664a73ae.exe
-
Size
381KB
-
MD5
a3d480ba00137202a96d1fe4d563d552
-
SHA1
e528412dc45db42f1c630f4644b46a8377974e2c
-
SHA256
bc8a042d1b77efec281dcc1f7653165e2e8218e6ef0dc225571aef6c664a73ae
-
SHA512
8a44a80af2ef6ba170a8ff4a91414ba56e264497ee87d7a56f65e2039fe15075d030530556b83f9448f06ee0393314c6c90fb5164f936a3fe003f6f392cd6673
-
SSDEEP
6144:balupTHjhG7pgQZzMeUBusOtQvMkM2U5ruSQPc1YdQ2CpUtB5:eYTHdypgQBMeUK35ruJEKdnsk/
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000\Control Panel\International\Geo\Nation bc8a042d1b77efec281dcc1f7653165e2e8218e6ef0dc225571aef6c664a73ae.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
pid Process 4432 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4432 taskkill.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1856 wrote to memory of 3496 1856 bc8a042d1b77efec281dcc1f7653165e2e8218e6ef0dc225571aef6c664a73ae.exe 97 PID 1856 wrote to memory of 3496 1856 bc8a042d1b77efec281dcc1f7653165e2e8218e6ef0dc225571aef6c664a73ae.exe 97 PID 1856 wrote to memory of 3496 1856 bc8a042d1b77efec281dcc1f7653165e2e8218e6ef0dc225571aef6c664a73ae.exe 97 PID 3496 wrote to memory of 4432 3496 cmd.exe 99 PID 3496 wrote to memory of 4432 3496 cmd.exe 99 PID 3496 wrote to memory of 4432 3496 cmd.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc8a042d1b77efec281dcc1f7653165e2e8218e6ef0dc225571aef6c664a73ae.exe"C:\Users\Admin\AppData\Local\Temp\bc8a042d1b77efec281dcc1f7653165e2e8218e6ef0dc225571aef6c664a73ae.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "bc8a042d1b77efec281dcc1f7653165e2e8218e6ef0dc225571aef6c664a73ae.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\bc8a042d1b77efec281dcc1f7653165e2e8218e6ef0dc225571aef6c664a73ae.exe" & exit2⤵
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "bc8a042d1b77efec281dcc1f7653165e2e8218e6ef0dc225571aef6c664a73ae.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4432
-
-