Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
26/11/2023, 16:24
Static task
static1
Behavioral task
behavioral1
Sample
0c4b93248f879c55af0dbadabbfbcbd3.exe
Resource
win7-20231020-en
General
-
Target
0c4b93248f879c55af0dbadabbfbcbd3.exe
-
Size
200KB
-
MD5
0c4b93248f879c55af0dbadabbfbcbd3
-
SHA1
28f43c6a01ca3ee74ca1fc05bb37524a63fcc3da
-
SHA256
193cd25a701fee258502ce638347a3a94ca4dcb82acba581fb3faafdf4dfe9ae
-
SHA512
eba37ec05745ebb2848f4c1eb848e6a72c5c6cb48ef129ecd907cd32f2703df96e162a3049df975d39e1dc62b12c67e6003415cbe9def60b54f82952256b1768
-
SSDEEP
3072:bc7PTlvaUu4eCdxG7psbiIbhou3QepC/tcIZQjSgbE77mOAg0Fuj0nRgrV9:bsLgCyC513QepUcmZ7RAOnV9
Malware Config
Signatures
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-984744499-3605095035-265325720-1000\Control Panel\International\Geo\Nation 0c4b93248f879c55af0dbadabbfbcbd3.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 0c4b93248f879c55af0dbadabbfbcbd3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 0c4b93248f879c55af0dbadabbfbcbd3.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2988 timeout.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2996 0c4b93248f879c55af0dbadabbfbcbd3.exe 2996 0c4b93248f879c55af0dbadabbfbcbd3.exe 2996 0c4b93248f879c55af0dbadabbfbcbd3.exe 2996 0c4b93248f879c55af0dbadabbfbcbd3.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2996 wrote to memory of 2280 2996 0c4b93248f879c55af0dbadabbfbcbd3.exe 91 PID 2996 wrote to memory of 2280 2996 0c4b93248f879c55af0dbadabbfbcbd3.exe 91 PID 2996 wrote to memory of 2280 2996 0c4b93248f879c55af0dbadabbfbcbd3.exe 91 PID 2280 wrote to memory of 2988 2280 cmd.exe 93 PID 2280 wrote to memory of 2988 2280 cmd.exe 93 PID 2280 wrote to memory of 2988 2280 cmd.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c4b93248f879c55af0dbadabbfbcbd3.exe"C:\Users\Admin\AppData\Local\Temp\0c4b93248f879c55af0dbadabbfbcbd3.exe"1⤵
- Checks computer location settings
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\0c4b93248f879c55af0dbadabbfbcbd3.exe" & del "C:\ProgramData\*.dll"" & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\SysWOW64\timeout.exetimeout /t 53⤵
- Delays execution with timeout.exe
PID:2988
-
-