Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
15/11/2023, 07:32
Static task
static1
Behavioral task
behavioral1
Sample
2E55708A4D3F97B3131EE5ADF5C05EFA.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
2E55708A4D3F97B3131EE5ADF5C05EFA.exe
Resource
win10v2004-20231023-en
General
-
Target
2E55708A4D3F97B3131EE5ADF5C05EFA.exe
-
Size
68KB
-
MD5
2e55708a4d3f97b3131ee5adf5c05efa
-
SHA1
fe58bb9f710c983ecc5b30f653b8ef4ed71311de
-
SHA256
00720cc98eefb3d9f03600abfd3ebe6bc923a4f920d3990e121a957c4f090b93
-
SHA512
725d442eda167f3f4cff41b5039201a4d718fd14013f2b13bd3b156f221f2a3e3c5c8806dcc1a5734e292c3904d3d863803f29330cffd562adead3bbbcd3fe7e
-
SSDEEP
384:XFLkkmlPu9GtKHK3Qh2Klokrb/8Lz53/Afiylab4i7TOTU0lOKV4n6MO:XJLmlmGtKHKtK6krYLVvAfzlY7TOvvG
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation 2E55708A4D3F97B3131EE5ADF5C05EFA.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ˮӡ±êǩϵͳ.lnk 2E55708A4D3F97B3131EE5ADF5C05EFA.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ˮӡ±êǩϵͳ.lnk resvr.exe -
Executes dropped EXE 1 IoCs
pid Process 4220 resvr.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\Index.dat 2E55708A4D3F97B3131EE5ADF5C05EFA.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\resvr.exe 2E55708A4D3F97B3131EE5ADF5C05EFA.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\resvr.exe 2E55708A4D3F97B3131EE5ADF5C05EFA.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\Index.dat resvr.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 2E55708A4D3F97B3131EE5ADF5C05EFA.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1332 wrote to memory of 4220 1332 2E55708A4D3F97B3131EE5ADF5C05EFA.exe 93 PID 1332 wrote to memory of 4220 1332 2E55708A4D3F97B3131EE5ADF5C05EFA.exe 93 PID 1332 wrote to memory of 4220 1332 2E55708A4D3F97B3131EE5ADF5C05EFA.exe 93 PID 1332 wrote to memory of 4420 1332 2E55708A4D3F97B3131EE5ADF5C05EFA.exe 94 PID 1332 wrote to memory of 4420 1332 2E55708A4D3F97B3131EE5ADF5C05EFA.exe 94 PID 1332 wrote to memory of 4420 1332 2E55708A4D3F97B3131EE5ADF5C05EFA.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\2E55708A4D3F97B3131EE5ADF5C05EFA.exe"C:\Users\Admin\AppData\Local\Temp\2E55708A4D3F97B3131EE5ADF5C05EFA.exe"1⤵
- Checks computer location settings
- Drops startup file
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Program Files (x86)\Common Files\Microsoft Shared\resvr.exe"C:\Program Files (x86)\Common Files\Microsoft Shared\resvr.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Drops file in Program Files directory
PID:4220
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\X.bat" "2⤵PID:4420
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD52e55708a4d3f97b3131ee5adf5c05efa
SHA1fe58bb9f710c983ecc5b30f653b8ef4ed71311de
SHA25600720cc98eefb3d9f03600abfd3ebe6bc923a4f920d3990e121a957c4f090b93
SHA512725d442eda167f3f4cff41b5039201a4d718fd14013f2b13bd3b156f221f2a3e3c5c8806dcc1a5734e292c3904d3d863803f29330cffd562adead3bbbcd3fe7e
-
Filesize
68KB
MD52e55708a4d3f97b3131ee5adf5c05efa
SHA1fe58bb9f710c983ecc5b30f653b8ef4ed71311de
SHA25600720cc98eefb3d9f03600abfd3ebe6bc923a4f920d3990e121a957c4f090b93
SHA512725d442eda167f3f4cff41b5039201a4d718fd14013f2b13bd3b156f221f2a3e3c5c8806dcc1a5734e292c3904d3d863803f29330cffd562adead3bbbcd3fe7e
-
Filesize
68KB
MD52e55708a4d3f97b3131ee5adf5c05efa
SHA1fe58bb9f710c983ecc5b30f653b8ef4ed71311de
SHA25600720cc98eefb3d9f03600abfd3ebe6bc923a4f920d3990e121a957c4f090b93
SHA512725d442eda167f3f4cff41b5039201a4d718fd14013f2b13bd3b156f221f2a3e3c5c8806dcc1a5734e292c3904d3d863803f29330cffd562adead3bbbcd3fe7e
-
Filesize
210B
MD5f0f173c12a641c2aaf750095e28b1ac7
SHA1ae9b4765701b55dab44804a972eead916cec514a
SHA256d4a3585fa7b212c2c4df3ed66b6711f125606516dba9bdadf7efceea0d278c1e
SHA512ae1d6606da83ec9308c5be069896e2a05ff933bd85d529cc252bfbd042f42349e5a1d52e1e58f409a1a8d46550ee283f8bbef128227ac664b726389f09ed16f8
-
Filesize
2KB
MD5067251cef932f8dd6bb417dcdf46079e
SHA1864dbe4b742fc4d03dc355cb35973c82efb71e1e
SHA256758e1c7220498beb2d4d1f837f4811a8790f3275a7ee28011bb3b275045a2d90
SHA51219a4f023cb6a494b016c5d60eb122df3f7e270931293aae90cea2f7935921aaa1330681886270f4a76e65d03327d34ff7f411677a184047c8829fc11d4ee66f5