Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    158s
  • max time network
    168s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/10/2023, 17:04

General

  • Target

    d706fff7d06062fafb8fdeede9907cc1f98ac83dfe4ae0668e55dee3bdc806f6.exe

  • Size

    193KB

  • MD5

    12eebdd94702fb02298ceb41ebdfb1fc

  • SHA1

    ae8f6d8cd000c1b47d8247a9680a2ac816c33fbe

  • SHA256

    d706fff7d06062fafb8fdeede9907cc1f98ac83dfe4ae0668e55dee3bdc806f6

  • SHA512

    db9a8090b6813710c0f0f461f9480bdd9a4151edda8495d44d526919772b02a268676a59a0d58f49ed2b836d556bd2c00d042a70788627696817b4d100eb9d5d

  • SSDEEP

    6144:rBs27MMLyX5HXXXDTXXXOGqIII+pXXX5AYjKXXXDoXXXG6XXXxXXXLIIIEAkOCO7:rK20HXXX/XXXFqIIIcXXX5j2XXXcXXXi

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d706fff7d06062fafb8fdeede9907cc1f98ac83dfe4ae0668e55dee3bdc806f6.exe
    "C:\Users\Admin\AppData\Local\Temp\d706fff7d06062fafb8fdeede9907cc1f98ac83dfe4ae0668e55dee3bdc806f6.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2188
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\D706FF~1.EXE > nul
      2⤵
        PID:4508
    • C:\Windows\Debug\igkhost.exe
      C:\Windows\Debug\igkhost.exe
      1⤵
      • Executes dropped EXE
      • Checks processor information in registry
      PID:2992

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\Debug\igkhost.exe

      Filesize

      193KB

      MD5

      c2170b20bd5d4b65a1ba41470912d580

      SHA1

      b0c4b5b50410444eb3ea15ca8cdef58003c42725

      SHA256

      a3fbcd2637060dde2f166f8f8800ced860eb4ef6435a9fc143e1ca124ec0eeb3

      SHA512

      68b607b9b93b15eb5c0f7b569278af33df2ea07dd3474197f498135b5489e4c6f7edbc7257275e40f74e97f8ac5cdf98fbd0bdd2d369966078f42734a21bf062

    • C:\Windows\debug\igkhost.exe

      Filesize

      193KB

      MD5

      c2170b20bd5d4b65a1ba41470912d580

      SHA1

      b0c4b5b50410444eb3ea15ca8cdef58003c42725

      SHA256

      a3fbcd2637060dde2f166f8f8800ced860eb4ef6435a9fc143e1ca124ec0eeb3

      SHA512

      68b607b9b93b15eb5c0f7b569278af33df2ea07dd3474197f498135b5489e4c6f7edbc7257275e40f74e97f8ac5cdf98fbd0bdd2d369966078f42734a21bf062