Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
223s -
max time network
235s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2023, 17:03
Static task
static1
Behavioral task
behavioral1
Sample
e2d112621958c459ee845d251ce454fbbc09c254903c41b2b8e46967025e62db.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
e2d112621958c459ee845d251ce454fbbc09c254903c41b2b8e46967025e62db.exe
Resource
win10v2004-20230915-en
General
-
Target
e2d112621958c459ee845d251ce454fbbc09c254903c41b2b8e46967025e62db.exe
-
Size
1008KB
-
MD5
9d043eedbf6f7ef3b35696bd8c2c3dae
-
SHA1
3e47f43725a54c9c25ee9418960284f150911150
-
SHA256
e2d112621958c459ee845d251ce454fbbc09c254903c41b2b8e46967025e62db
-
SHA512
4d13fd6e6fd711a35ed1f8ae7d1cdc6e4b7bd80d1a6b9cfb969960a56cc25d042cc50b657f506f13057d31392356d20b04a9f44427a2afe164ba3de7326bab6b
-
SSDEEP
12288:KkMUcKgXpomfqpKKIhIEij/kHzLpeVwcwfdf5aXaRCKrR/Ya2s5wjjCFL1JhRMkZ:KPUc5rfcKK4IR/s1zCatdwfUSeLEk7
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation e2d112621958c459ee845d251ce454fbbc09c254903c41b2b8e46967025e62db.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000_Classes\Local Settings e2d112621958c459ee845d251ce454fbbc09c254903c41b2b8e46967025e62db.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 224 e2d112621958c459ee845d251ce454fbbc09c254903c41b2b8e46967025e62db.exe 224 e2d112621958c459ee845d251ce454fbbc09c254903c41b2b8e46967025e62db.exe 5052 hh.exe 5052 hh.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 224 wrote to memory of 5052 224 e2d112621958c459ee845d251ce454fbbc09c254903c41b2b8e46967025e62db.exe 85 PID 224 wrote to memory of 5052 224 e2d112621958c459ee845d251ce454fbbc09c254903c41b2b8e46967025e62db.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\e2d112621958c459ee845d251ce454fbbc09c254903c41b2b8e46967025e62db.exe"C:\Users\Admin\AppData\Local\Temp\e2d112621958c459ee845d251ce454fbbc09c254903c41b2b8e46967025e62db.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Windows\hh.exe"C:\Windows\hh.exe" C:\Users\Public\Documents\OK.chm2⤵
- Suspicious use of SetWindowsHookEx
PID:5052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
198KB
MD54c64018586b08237f90cad9836523d17
SHA1d65493d7b722ef822220f81557fc9c0a1c3b152a
SHA256cb100b082270c92d995efa3b5277341f503cb38f6c12557109614e3ff73f406e
SHA512ceab891d194a4d00dcd399182bbd1070e787a894f7ff400a7d9e7555e6868ac21cd644f37a259fda579c12d69c646862d3d2e35b19aa21a3ffee09a7f4f6f768