Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
170s -
max time network
175s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
23/12/2023, 12:43
Static task
static1
Behavioral task
behavioral1
Sample
installer.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
installer.exe
Resource
win10v2004-20231215-en
General
-
Target
installer.exe
-
Size
41KB
-
MD5
19668f1460eccde1dc875e69ec6325b7
-
SHA1
596d7a55839d578a2dfdef3d04023ed66bfff03e
-
SHA256
82559d919db6f971aeb19316d86dda8bb735f7a4830f5a62fb70d521ff0f15b2
-
SHA512
47e45dde0085a5d82eb264b964ba4dc628fab87e40f67bc9f6bf799de3a7fa1cb50c910b6cad97ebad9bced35e97964ed88516f7d4c7174287daafc528dc22fc
-
SSDEEP
768:Ga7HmiY7iDT6pKf6QSiWhkU57lLOv2a0KKR5sFbAgAbLcGukYH5X:+iY0TyKdWhkU57lLOd0K+5sF8gAbLMki
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Control Panel\International\Geo\Nation installer.exe -
Executes dropped EXE 1 IoCs
pid Process 1544 installer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4732 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1544 installer.exe 1544 installer.exe 1544 installer.exe 1544 installer.exe 1544 installer.exe 1544 installer.exe 1544 installer.exe 1544 installer.exe 1544 installer.exe 1544 installer.exe 1544 installer.exe 1544 installer.exe 1544 installer.exe 1544 installer.exe 1544 installer.exe 1544 installer.exe 1544 installer.exe 1544 installer.exe 1544 installer.exe 1544 installer.exe 1544 installer.exe 1544 installer.exe 1544 installer.exe 1544 installer.exe 1544 installer.exe 1544 installer.exe 1544 installer.exe 1544 installer.exe 1544 installer.exe 1544 installer.exe 1544 installer.exe 1544 installer.exe 1544 installer.exe 1544 installer.exe 1544 installer.exe 1544 installer.exe 1544 installer.exe 1544 installer.exe 1544 installer.exe 1544 installer.exe 1544 installer.exe 1544 installer.exe 1544 installer.exe 1544 installer.exe 1544 installer.exe 1544 installer.exe 1544 installer.exe 1544 installer.exe 1544 installer.exe 1544 installer.exe 1544 installer.exe 1544 installer.exe 1544 installer.exe 1544 installer.exe 1544 installer.exe 1544 installer.exe 1544 installer.exe 1544 installer.exe 1544 installer.exe 1544 installer.exe 1544 installer.exe 1544 installer.exe 1544 installer.exe 1544 installer.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1544 installer.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2808 wrote to memory of 1544 2808 installer.exe 90 PID 2808 wrote to memory of 1544 2808 installer.exe 90 PID 2808 wrote to memory of 1544 2808 installer.exe 90 PID 1544 wrote to memory of 4732 1544 installer.exe 95 PID 1544 wrote to memory of 4732 1544 installer.exe 95 PID 1544 wrote to memory of 4732 1544 installer.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\installer.exe"C:\Users\Admin\AppData\Local\Temp\installer.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\installer.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\installer.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "hdrealtek" /XML "C:\Users\Admin\AppData\Local\Temp\tmpD496.tmp" /F3⤵
- Creates scheduled task(s)
PID:4732
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
41KB
MD519668f1460eccde1dc875e69ec6325b7
SHA1596d7a55839d578a2dfdef3d04023ed66bfff03e
SHA25682559d919db6f971aeb19316d86dda8bb735f7a4830f5a62fb70d521ff0f15b2
SHA51247e45dde0085a5d82eb264b964ba4dc628fab87e40f67bc9f6bf799de3a7fa1cb50c910b6cad97ebad9bced35e97964ed88516f7d4c7174287daafc528dc22fc
-
Filesize
1KB
MD5b2ac3c7ce2ed43c81a5224181b86ca39
SHA10044ecc350c384b18c7bfd158c8ef556ae9fe87b
SHA256bb017fa7570d2a677bef7575c094c548e551329d9fc05870f275d2061fbee658
SHA51229e53e38b0e767f18f024119eb0c9cee3a85feb326cf5b32ac7417828f767755db7ad5fe375bf9dc58a8327657ae6a45c67b2721e26c410b5e55e7456336988c