Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231025-en -
resource tags
arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system -
submitted
05/11/2023, 04:31
Static task
static1
Behavioral task
behavioral1
Sample
620339dd8a054767aa44d0b848272015aa4c25bfd25430181d8b169452539a97.exe
Resource
win10v2004-20231025-en
General
-
Target
620339dd8a054767aa44d0b848272015aa4c25bfd25430181d8b169452539a97.exe
-
Size
332KB
-
MD5
bd9864464b5337a03edbf404c5c05246
-
SHA1
5fee41613d0da0dfd93f41c86bcca32aad25a937
-
SHA256
620339dd8a054767aa44d0b848272015aa4c25bfd25430181d8b169452539a97
-
SHA512
63963a115b0d5c6dae175687864c2afdff23f18058ab75890c9aff72f94ccd56dba85d01d82573e190ff20385c978031fecddc73b7fec87e20fa8c89c4cdab26
-
SSDEEP
6144:DktLLCXCVVm1YkXhgssQqoYM3EXE/41/GDQaYWf:DaLuXCV1kXhROKEU/40DF
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation 620339dd8a054767aa44d0b848272015aa4c25bfd25430181d8b169452539a97.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4080 set thread context of 4492 4080 620339dd8a054767aa44d0b848272015aa4c25bfd25430181d8b169452539a97.exe 89 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
pid Process 2732 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2732 taskkill.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 4080 wrote to memory of 4492 4080 620339dd8a054767aa44d0b848272015aa4c25bfd25430181d8b169452539a97.exe 89 PID 4080 wrote to memory of 4492 4080 620339dd8a054767aa44d0b848272015aa4c25bfd25430181d8b169452539a97.exe 89 PID 4080 wrote to memory of 4492 4080 620339dd8a054767aa44d0b848272015aa4c25bfd25430181d8b169452539a97.exe 89 PID 4080 wrote to memory of 4492 4080 620339dd8a054767aa44d0b848272015aa4c25bfd25430181d8b169452539a97.exe 89 PID 4080 wrote to memory of 4492 4080 620339dd8a054767aa44d0b848272015aa4c25bfd25430181d8b169452539a97.exe 89 PID 4080 wrote to memory of 4492 4080 620339dd8a054767aa44d0b848272015aa4c25bfd25430181d8b169452539a97.exe 89 PID 4080 wrote to memory of 4492 4080 620339dd8a054767aa44d0b848272015aa4c25bfd25430181d8b169452539a97.exe 89 PID 4080 wrote to memory of 4492 4080 620339dd8a054767aa44d0b848272015aa4c25bfd25430181d8b169452539a97.exe 89 PID 4080 wrote to memory of 4492 4080 620339dd8a054767aa44d0b848272015aa4c25bfd25430181d8b169452539a97.exe 89 PID 4080 wrote to memory of 4492 4080 620339dd8a054767aa44d0b848272015aa4c25bfd25430181d8b169452539a97.exe 89 PID 4492 wrote to memory of 4820 4492 620339dd8a054767aa44d0b848272015aa4c25bfd25430181d8b169452539a97.exe 99 PID 4492 wrote to memory of 4820 4492 620339dd8a054767aa44d0b848272015aa4c25bfd25430181d8b169452539a97.exe 99 PID 4492 wrote to memory of 4820 4492 620339dd8a054767aa44d0b848272015aa4c25bfd25430181d8b169452539a97.exe 99 PID 4820 wrote to memory of 2732 4820 cmd.exe 101 PID 4820 wrote to memory of 2732 4820 cmd.exe 101 PID 4820 wrote to memory of 2732 4820 cmd.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\620339dd8a054767aa44d0b848272015aa4c25bfd25430181d8b169452539a97.exe"C:\Users\Admin\AppData\Local\Temp\620339dd8a054767aa44d0b848272015aa4c25bfd25430181d8b169452539a97.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Users\Admin\AppData\Local\Temp\620339dd8a054767aa44d0b848272015aa4c25bfd25430181d8b169452539a97.exe"C:\Users\Admin\AppData\Local\Temp\620339dd8a054767aa44d0b848272015aa4c25bfd25430181d8b169452539a97.exe"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "620339dd8a054767aa44d0b848272015aa4c25bfd25430181d8b169452539a97.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\620339dd8a054767aa44d0b848272015aa4c25bfd25430181d8b169452539a97.exe" & exit3⤵
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "620339dd8a054767aa44d0b848272015aa4c25bfd25430181d8b169452539a97.exe" /f4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2732
-
-
-