Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/12/2023, 18:16

General

  • Target

    0b1a3f997b9b89dc62968a69a8888fe6.exe

  • Size

    296KB

  • MD5

    0b1a3f997b9b89dc62968a69a8888fe6

  • SHA1

    ddb4c93e847d56feb12ff9b83c53222f0cd0b58b

  • SHA256

    58b055efd58d032d96c3cf06627f0f9bc82ac7e2c32eec6e52256373e502e884

  • SHA512

    6a2d4f004fb01a84fcfd01da7240df812e3fa01b8f932290167b16bf17ca1279ada5b8a7d0d3af7d260c8aa530da5229c5595c41c633a79c4016232bc8ea3fe5

  • SSDEEP

    6144:kkxD1y0FXrKnvmb7/D26OJYPsMiqDJlJNwHG6s20EBb4jHX3QA/hwNGhWhThPvMc:keD1y0F7Knvmb7/D265DJlJNwHG6JTbv

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0b1a3f997b9b89dc62968a69a8888fe6.exe
    "C:\Users\Admin\AppData\Local\Temp\0b1a3f997b9b89dc62968a69a8888fe6.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4548
    • C:\Users\Admin\tfmaz.exe
      "C:\Users\Admin\tfmaz.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1980

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\tfmaz.exe

    Filesize

    90KB

    MD5

    f75f5db50546bb910ba2912f53e61f8c

    SHA1

    f5470c925e41fa8ce44259e4d1a782e09e467d2a

    SHA256

    2b3b7f0c31ffb3489f0111c446bd5a4354606b7dcfca2e6d980121dcebb191ce

    SHA512

    bc7ba0d2606a75079fa80edb01d585b1936c90a4f6b625b0636919fc35ae67bc1ef200203aa94c58f1777f01a2eba89a030caa3f681b9840b8b2f362f4421a9e

  • C:\Users\Admin\tfmaz.exe

    Filesize

    110KB

    MD5

    026ada462a213374831b0039f572206c

    SHA1

    b4da682c255ecc2d78deb17c21a4a4c9e9932583

    SHA256

    b6aae5dac7b7e09bf2d16334962993890de5201aae221d8b6cca9699632d86db

    SHA512

    8a8e2e9ac03c5faea72493964a0760ca99b3fac4a7bb055f32e58ee41d4b72a97e816d422fcb75c305f0b73114a7e52bbf8a343e509b081c2ed2bc5b3eec35c0

  • C:\Users\Admin\tfmaz.exe

    Filesize

    88KB

    MD5

    8137ebd80516eab82eaa022e72792935

    SHA1

    17407e98c71cfc647a13cfde2d987049f0cd8d5d

    SHA256

    06acdbb31de6eda6856054c65af2e19189c72b9f829e84d6f1d04e4cc16e8678

    SHA512

    0223ba1c4dfe88b401c033dbfdc3cc6bfc075e790d2a6da009587f49c1a4d4804a9c0701088b7aa69dee62070dfbe2fce60019663734bc83f99926002469dd4a