Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/11/2023, 07:32

General

  • Target

    2E55708A4D3F97B3131EE5ADF5C05EFA.exe

  • Size

    68KB

  • MD5

    2e55708a4d3f97b3131ee5adf5c05efa

  • SHA1

    fe58bb9f710c983ecc5b30f653b8ef4ed71311de

  • SHA256

    00720cc98eefb3d9f03600abfd3ebe6bc923a4f920d3990e121a957c4f090b93

  • SHA512

    725d442eda167f3f4cff41b5039201a4d718fd14013f2b13bd3b156f221f2a3e3c5c8806dcc1a5734e292c3904d3d863803f29330cffd562adead3bbbcd3fe7e

  • SSDEEP

    384:XFLkkmlPu9GtKHK3Qh2Klokrb/8Lz53/Afiylab4i7TOTU0lOKV4n6MO:XJLmlmGtKHKtK6krYLVvAfzlY7TOvvG

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2E55708A4D3F97B3131EE5ADF5C05EFA.exe
    "C:\Users\Admin\AppData\Local\Temp\2E55708A4D3F97B3131EE5ADF5C05EFA.exe"
    1⤵
    • Checks computer location settings
    • Drops startup file
    • Drops file in Program Files directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1332
    • C:\Program Files (x86)\Common Files\Microsoft Shared\resvr.exe
      "C:\Program Files (x86)\Common Files\Microsoft Shared\resvr.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Drops file in Program Files directory
      PID:4220
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\X.bat" "
      2⤵
        PID:4420

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Common Files\Microsoft Shared\resvr.exe

      Filesize

      68KB

      MD5

      2e55708a4d3f97b3131ee5adf5c05efa

      SHA1

      fe58bb9f710c983ecc5b30f653b8ef4ed71311de

      SHA256

      00720cc98eefb3d9f03600abfd3ebe6bc923a4f920d3990e121a957c4f090b93

      SHA512

      725d442eda167f3f4cff41b5039201a4d718fd14013f2b13bd3b156f221f2a3e3c5c8806dcc1a5734e292c3904d3d863803f29330cffd562adead3bbbcd3fe7e

    • C:\Program Files (x86)\Common Files\Microsoft Shared\resvr.exe

      Filesize

      68KB

      MD5

      2e55708a4d3f97b3131ee5adf5c05efa

      SHA1

      fe58bb9f710c983ecc5b30f653b8ef4ed71311de

      SHA256

      00720cc98eefb3d9f03600abfd3ebe6bc923a4f920d3990e121a957c4f090b93

      SHA512

      725d442eda167f3f4cff41b5039201a4d718fd14013f2b13bd3b156f221f2a3e3c5c8806dcc1a5734e292c3904d3d863803f29330cffd562adead3bbbcd3fe7e

    • C:\Program Files (x86)\Common Files\Microsoft Shared\resvr.exe

      Filesize

      68KB

      MD5

      2e55708a4d3f97b3131ee5adf5c05efa

      SHA1

      fe58bb9f710c983ecc5b30f653b8ef4ed71311de

      SHA256

      00720cc98eefb3d9f03600abfd3ebe6bc923a4f920d3990e121a957c4f090b93

      SHA512

      725d442eda167f3f4cff41b5039201a4d718fd14013f2b13bd3b156f221f2a3e3c5c8806dcc1a5734e292c3904d3d863803f29330cffd562adead3bbbcd3fe7e

    • C:\Users\Admin\AppData\Local\Temp\X.bat

      Filesize

      210B

      MD5

      f0f173c12a641c2aaf750095e28b1ac7

      SHA1

      ae9b4765701b55dab44804a972eead916cec514a

      SHA256

      d4a3585fa7b212c2c4df3ed66b6711f125606516dba9bdadf7efceea0d278c1e

      SHA512

      ae1d6606da83ec9308c5be069896e2a05ff933bd85d529cc252bfbd042f42349e5a1d52e1e58f409a1a8d46550ee283f8bbef128227ac664b726389f09ed16f8

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ˮӡ±êǩϵͳ.lnk

      Filesize

      2KB

      MD5

      067251cef932f8dd6bb417dcdf46079e

      SHA1

      864dbe4b742fc4d03dc355cb35973c82efb71e1e

      SHA256

      758e1c7220498beb2d4d1f837f4811a8790f3275a7ee28011bb3b275045a2d90

      SHA512

      19a4f023cb6a494b016c5d60eb122df3f7e270931293aae90cea2f7935921aaa1330681886270f4a76e65d03327d34ff7f411677a184047c8829fc11d4ee66f5

    • memory/1332-0-0x0000000000400000-0x0000000000415000-memory.dmp

      Filesize

      84KB

    • memory/1332-4-0x0000000000400000-0x0000000000415000-memory.dmp

      Filesize

      84KB

    • memory/4220-70-0x0000000000400000-0x0000000000415000-memory.dmp

      Filesize

      84KB