Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2023, 19:19
Behavioral task
behavioral1
Sample
dd49a794911cc9402e712e0e9ffeb0d7_JC.exe
Resource
win7-20230831-en
General
-
Target
dd49a794911cc9402e712e0e9ffeb0d7_JC.exe
-
Size
332KB
-
MD5
dd49a794911cc9402e712e0e9ffeb0d7
-
SHA1
8b488448f6797440f79c8f8b3742fe63ff52dbc7
-
SHA256
9af836be97d28f466053fcb064ab98e1c04bc62774b394c5d82fc8b898bc817a
-
SHA512
0ec4bb119b6149cd04ff097454b90050bbbf05457745b53019681bd5147dcf376af882273bd08808fd88393ad446be704db838a5ab82439e66b954fb9682c3cf
-
SSDEEP
3072:NdXi+V5Kgxpdxj8gbib20xTyst542t8ZHWBow8+zoB91wDQgJl0x2AEMenKbZis7:Nd7rpL43btmQ58Z27zw39gY2FeZhj
Malware Config
Extracted
urelas
218.54.31.165
218.54.31.226
Signatures
-
resource yara_rule behavioral2/files/0x00070000000231d0-31.dat aspack_v212_v242 behavioral2/files/0x00070000000231d0-33.dat aspack_v212_v242 behavioral2/files/0x00070000000231d0-35.dat aspack_v212_v242 -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation kixin.exe Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation gizosi.exe Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation dd49a794911cc9402e712e0e9ffeb0d7_JC.exe -
Executes dropped EXE 3 IoCs
pid Process 3068 kixin.exe 2784 gizosi.exe 5052 ujtut.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5052 ujtut.exe 5052 ujtut.exe 5052 ujtut.exe 5052 ujtut.exe 5052 ujtut.exe 5052 ujtut.exe 5052 ujtut.exe 5052 ujtut.exe 5052 ujtut.exe 5052 ujtut.exe 5052 ujtut.exe 5052 ujtut.exe 5052 ujtut.exe 5052 ujtut.exe 5052 ujtut.exe 5052 ujtut.exe 5052 ujtut.exe 5052 ujtut.exe 5052 ujtut.exe 5052 ujtut.exe 5052 ujtut.exe 5052 ujtut.exe 5052 ujtut.exe 5052 ujtut.exe 5052 ujtut.exe 5052 ujtut.exe 5052 ujtut.exe 5052 ujtut.exe 5052 ujtut.exe 5052 ujtut.exe 5052 ujtut.exe 5052 ujtut.exe 5052 ujtut.exe 5052 ujtut.exe 5052 ujtut.exe 5052 ujtut.exe 5052 ujtut.exe 5052 ujtut.exe 5052 ujtut.exe 5052 ujtut.exe 5052 ujtut.exe 5052 ujtut.exe 5052 ujtut.exe 5052 ujtut.exe 5052 ujtut.exe 5052 ujtut.exe 5052 ujtut.exe 5052 ujtut.exe 5052 ujtut.exe 5052 ujtut.exe 5052 ujtut.exe 5052 ujtut.exe 5052 ujtut.exe 5052 ujtut.exe 5052 ujtut.exe 5052 ujtut.exe 5052 ujtut.exe 5052 ujtut.exe 5052 ujtut.exe 5052 ujtut.exe 5052 ujtut.exe 5052 ujtut.exe 5052 ujtut.exe 5052 ujtut.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3096 wrote to memory of 3068 3096 dd49a794911cc9402e712e0e9ffeb0d7_JC.exe 83 PID 3096 wrote to memory of 3068 3096 dd49a794911cc9402e712e0e9ffeb0d7_JC.exe 83 PID 3096 wrote to memory of 3068 3096 dd49a794911cc9402e712e0e9ffeb0d7_JC.exe 83 PID 3096 wrote to memory of 1972 3096 dd49a794911cc9402e712e0e9ffeb0d7_JC.exe 84 PID 3096 wrote to memory of 1972 3096 dd49a794911cc9402e712e0e9ffeb0d7_JC.exe 84 PID 3096 wrote to memory of 1972 3096 dd49a794911cc9402e712e0e9ffeb0d7_JC.exe 84 PID 3068 wrote to memory of 2784 3068 kixin.exe 86 PID 3068 wrote to memory of 2784 3068 kixin.exe 86 PID 3068 wrote to memory of 2784 3068 kixin.exe 86 PID 2784 wrote to memory of 5052 2784 gizosi.exe 95 PID 2784 wrote to memory of 5052 2784 gizosi.exe 95 PID 2784 wrote to memory of 5052 2784 gizosi.exe 95 PID 2784 wrote to memory of 5084 2784 gizosi.exe 96 PID 2784 wrote to memory of 5084 2784 gizosi.exe 96 PID 2784 wrote to memory of 5084 2784 gizosi.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\dd49a794911cc9402e712e0e9ffeb0d7_JC.exe"C:\Users\Admin\AppData\Local\Temp\dd49a794911cc9402e712e0e9ffeb0d7_JC.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Users\Admin\AppData\Local\Temp\kixin.exe"C:\Users\Admin\AppData\Local\Temp\kixin.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\gizosi.exe"C:\Users\Admin\AppData\Local\Temp\gizosi.exe" OK3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\ujtut.exe"C:\Users\Admin\AppData\Local\Temp\ujtut.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:5052
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "4⤵PID:5084
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "2⤵PID:1972
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224B
MD57ad9635452d1471375751e0b4e1c758c
SHA16acfda9a96d45895cce23ae7fa28869fd4b40a4c
SHA256bcbb038f029005496505099d8c329ea60c834eb45b335326974831597e20c3e2
SHA512f083dc2ef99add404d33230ad6ce6c3e7f030a5cb80e8de96a37ab831ce4051ef7496be9c5b376233cc4df2a1670e9f0e39b989301d8a501678621caf7263f22
-
Filesize
282B
MD5a1aec52cdab054617aa595ed3cd584be
SHA18873127a7136ba52beef1725271d80ccad9f7d35
SHA25653f050b1ba03bc601741fabd65aba819d44c3c92569c083375919967373b081e
SHA512b8b107a0d898b5c346638e731a73eac69f7f1c80330f29fac5cae2b7cba53305fb3b60803caa636406ab88f7caeb9668d8878dc0a1ca9407b06e6c9b842f0276
-
Filesize
332KB
MD58af59a97f358134df53dc3be35449ace
SHA1efe23f3b939ee29748278a65077d3300689e3af1
SHA256a57b2268106fd5bf8244d7eb25983cb59d4a59f2185248f15fd34d42f3928641
SHA512d9078e199686095f1ea0a352fa099dfa1ac23c71a66b38ab9dbf5d1f04957ca93e2a933d7c4de4f1da4ee0362232a3cba8577c4356e0b02e6448fa09997556a1
-
Filesize
332KB
MD58af59a97f358134df53dc3be35449ace
SHA1efe23f3b939ee29748278a65077d3300689e3af1
SHA256a57b2268106fd5bf8244d7eb25983cb59d4a59f2185248f15fd34d42f3928641
SHA512d9078e199686095f1ea0a352fa099dfa1ac23c71a66b38ab9dbf5d1f04957ca93e2a933d7c4de4f1da4ee0362232a3cba8577c4356e0b02e6448fa09997556a1
-
Filesize
512B
MD57aed483a959072f476bf7da22fed9c52
SHA1fafffea24fab269390a0a1b502b2b39b171bdead
SHA2563401d67e753943502a2dad93701c5c6ed78fc76e4f49eeca141fffbdcb15e747
SHA5127f418f0f5eb544daccd229af1026d1db660d660066b02a24312282b6db9a379f7b9dd1894d42523515488a7993006a5512584a922bb388ac9bdfbc7e0f852006
-
Filesize
332KB
MD58af59a97f358134df53dc3be35449ace
SHA1efe23f3b939ee29748278a65077d3300689e3af1
SHA256a57b2268106fd5bf8244d7eb25983cb59d4a59f2185248f15fd34d42f3928641
SHA512d9078e199686095f1ea0a352fa099dfa1ac23c71a66b38ab9dbf5d1f04957ca93e2a933d7c4de4f1da4ee0362232a3cba8577c4356e0b02e6448fa09997556a1
-
Filesize
332KB
MD58af59a97f358134df53dc3be35449ace
SHA1efe23f3b939ee29748278a65077d3300689e3af1
SHA256a57b2268106fd5bf8244d7eb25983cb59d4a59f2185248f15fd34d42f3928641
SHA512d9078e199686095f1ea0a352fa099dfa1ac23c71a66b38ab9dbf5d1f04957ca93e2a933d7c4de4f1da4ee0362232a3cba8577c4356e0b02e6448fa09997556a1
-
Filesize
332KB
MD58af59a97f358134df53dc3be35449ace
SHA1efe23f3b939ee29748278a65077d3300689e3af1
SHA256a57b2268106fd5bf8244d7eb25983cb59d4a59f2185248f15fd34d42f3928641
SHA512d9078e199686095f1ea0a352fa099dfa1ac23c71a66b38ab9dbf5d1f04957ca93e2a933d7c4de4f1da4ee0362232a3cba8577c4356e0b02e6448fa09997556a1
-
Filesize
136KB
MD5d6a55a8012c6f1bb183d909806522b10
SHA14b2f5bcb1cbe5fa3a8baa4a4564efc2ba6618874
SHA256f9d1a0dca90954d99640ec4d51d1ce708c4b000047a6c4978b9423786ceed850
SHA512af8876186e590efbdd8cc2c11695c773a32aba32f04c3ee2fc555b8305922689c52330ba1556ae5c19905736ac10fa7c9b80b92b4e2c21d6109920c4959dba37
-
Filesize
136KB
MD5d6a55a8012c6f1bb183d909806522b10
SHA14b2f5bcb1cbe5fa3a8baa4a4564efc2ba6618874
SHA256f9d1a0dca90954d99640ec4d51d1ce708c4b000047a6c4978b9423786ceed850
SHA512af8876186e590efbdd8cc2c11695c773a32aba32f04c3ee2fc555b8305922689c52330ba1556ae5c19905736ac10fa7c9b80b92b4e2c21d6109920c4959dba37
-
Filesize
136KB
MD5d6a55a8012c6f1bb183d909806522b10
SHA14b2f5bcb1cbe5fa3a8baa4a4564efc2ba6618874
SHA256f9d1a0dca90954d99640ec4d51d1ce708c4b000047a6c4978b9423786ceed850
SHA512af8876186e590efbdd8cc2c11695c773a32aba32f04c3ee2fc555b8305922689c52330ba1556ae5c19905736ac10fa7c9b80b92b4e2c21d6109920c4959dba37