Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 18:13
Static task
static1
Behavioral task
behavioral1
Sample
0af473977e2b58a3630dc2bd59245127.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0af473977e2b58a3630dc2bd59245127.exe
Resource
win10v2004-20231222-en
General
-
Target
0af473977e2b58a3630dc2bd59245127.exe
-
Size
89KB
-
MD5
0af473977e2b58a3630dc2bd59245127
-
SHA1
6b1086070e0918c428b4f6688fe2760c9ab9dfea
-
SHA256
76fe72e0ecdc389b5749df5fe406cb70110b1ef8b64e51cf0a96da2fa2ec5eb2
-
SHA512
d2f001ed413538368597585483c6745ab1bec058e227ada41937b75435f9456135b876e0ce40249389448b9769a37c3c06233c0d648cfaf9f613e42ad0b92450
-
SSDEEP
1536:ef/SovFSSZtDgN+DpDkDEFtC+YF8965L+v:I/zv0SZtDgN+Dp+ErYF896W
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer_new.exe" 0af473977e2b58a3630dc2bd59245127.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 0af473977e2b58a3630dc2bd59245127.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\zqhcxsgsuandrhu = "C:\\Windows\\oriyyvfudahfsbxcugqr.exe" 0af473977e2b58a3630dc2bd59245127.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zqhcxsgsuandrhu = "C:\\Windows\\oriyyvfudahfsbxcugqr.exe" 0af473977e2b58a3630dc2bd59245127.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\zqhcxsgsuandrhu = "C:\\ProgramData\\oriyyvfudahfsbxcugqr.exe" 0af473977e2b58a3630dc2bd59245127.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zqhcxsgsuandrhu = "C:\\ProgramData\\oriyyvfudahfsbxcugqr.exe" 0af473977e2b58a3630dc2bd59245127.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\oriyyvfudahfsbxcugqr.exe 0af473977e2b58a3630dc2bd59245127.exe File opened for modification C:\Windows\oriyyvfudahfsbxcugqr.exe 0af473977e2b58a3630dc2bd59245127.exe File created C:\Windows\explorer_new.exe 0af473977e2b58a3630dc2bd59245127.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16B
MD589768cbb154cace5fcf72a8c744d8aeb
SHA10284e976dedfa00df66b1661ceabb3a796339b5f
SHA2563de8b7ee12d9094ccc8f883d7831fbfa858419d403fd10d2e8833d165bf72b94
SHA5122f8a8453040c82595f35fd30b930f2428b8830f69dae6734830f35453f62c1bb903a795b616bf1080c8db79b82cdfd0dcadc5e37a29f37020837d2996d6db85c