Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    143s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/10/2023, 19:36

General

  • Target

    3b09c2f2689e7c752092ac08ac1c94d0_exe32.exe

  • Size

    88KB

  • MD5

    3b09c2f2689e7c752092ac08ac1c94d0

  • SHA1

    b4216fe85eb4fcaff5eb4b154954486ab5a78b8c

  • SHA256

    b1c30abd717d493c7ef1c6c235b8ec72e3ce83509e06326528d75e3d2b6c4f54

  • SHA512

    b2ec1f8f3e95ee2f122b65358a1c1979722121e992dfad785883944df28b4879a11ee0b1c59659a341b2c906ce35bdfed623fd446c781e933e9fea0bf7182f0e

  • SSDEEP

    1536:JdXkE87nccOtwqsIcGIjAPdrl86QpCXs8T3yv:rUE87cxtplAKri6WCXs8I

Score
10/10

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.tripod.com
  • Port:
    21
  • Username:
    onthelinux
  • Password:
    741852abc

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3b09c2f2689e7c752092ac08ac1c94d0_exe32.exe
    "C:\Users\Admin\AppData\Local\Temp\3b09c2f2689e7c752092ac08ac1c94d0_exe32.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:404
    • C:\Program Files (x86)\1f564c0a\jusched.exe
      "C:\Program Files (x86)\1f564c0a\jusched.exe"
      2⤵
      • Executes dropped EXE
      PID:4756

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\1f564c0a\1f564c0a

    Filesize

    17B

    MD5

    4d77d6b250ffb567743b8dbcdad695b8

    SHA1

    d5a8f98f9433f6d36c74df463cef3e2cf524462d

    SHA256

    7ec7a3a23890c3592f5b762aecf11adbf8831fad11b8048aedfa7315d599c5f2

    SHA512

    5655153049101fd67125d484c81f1ad30b44f36f00e3aabfe8d730a21661f4b394357b60da549289def4311b4cc7bd508d8fd6b8db254cd442b2152f8902bd71

  • C:\Program Files (x86)\1f564c0a\jusched.exe

    Filesize

    88KB

    MD5

    82473ee795de351d1db1ff976c29ab0e

    SHA1

    aad0be2151fb00ff6fa3b0425dbeb35b80c10641

    SHA256

    80be50eb6f59326369f7b7df8a914b2d50c1a8e529e1b90ab81d018bfc339e25

    SHA512

    c8ff45b82f866ee0b069aa179ef9a6fdcb49cf0da5b05b6154f441c6f485904313ba244d934de2f44a4fcbd89f17d283ef91df9e20420442105f9cbc8b28aff0

  • C:\Program Files (x86)\1f564c0a\jusched.exe

    Filesize

    88KB

    MD5

    82473ee795de351d1db1ff976c29ab0e

    SHA1

    aad0be2151fb00ff6fa3b0425dbeb35b80c10641

    SHA256

    80be50eb6f59326369f7b7df8a914b2d50c1a8e529e1b90ab81d018bfc339e25

    SHA512

    c8ff45b82f866ee0b069aa179ef9a6fdcb49cf0da5b05b6154f441c6f485904313ba244d934de2f44a4fcbd89f17d283ef91df9e20420442105f9cbc8b28aff0

  • C:\Program Files (x86)\1f564c0a\jusched.exe

    Filesize

    88KB

    MD5

    82473ee795de351d1db1ff976c29ab0e

    SHA1

    aad0be2151fb00ff6fa3b0425dbeb35b80c10641

    SHA256

    80be50eb6f59326369f7b7df8a914b2d50c1a8e529e1b90ab81d018bfc339e25

    SHA512

    c8ff45b82f866ee0b069aa179ef9a6fdcb49cf0da5b05b6154f441c6f485904313ba244d934de2f44a4fcbd89f17d283ef91df9e20420442105f9cbc8b28aff0

  • memory/404-4-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/404-6-0x00000000006A0000-0x00000000006A8000-memory.dmp

    Filesize

    32KB

  • memory/404-5-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/404-0-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/404-22-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/404-2-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/404-1-0x00000000006A0000-0x00000000006A8000-memory.dmp

    Filesize

    32KB

  • memory/4756-19-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/4756-21-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/4756-24-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB