Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    89s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/12/2023, 20:39

General

  • Target

    117df22c3509702a54a9f97fcd27768d.exe

  • Size

    639KB

  • MD5

    117df22c3509702a54a9f97fcd27768d

  • SHA1

    a55b02758e00d26b6d9ee0966fb45362d9ee78f9

  • SHA256

    19bc1945cca25fdefe121544a0e3f36e727fe2b219ec270bbf2ebfef4dc632e1

  • SHA512

    c2659261b54b1aa2e23ed295c18f1d9570ee2aadaeb6c5962d7275946772737c38821f92e78298a1243ac956c817a5dcfb996d7b03761c9caaecba2263a3e7d6

  • SSDEEP

    12288:7w4ub21OBjYGRaJQagcBIzZn3OEXlI/4okHd3hLH9tf0RVah:ULb2lGRFdp3+kHdldtmVah

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\117df22c3509702a54a9f97fcd27768d.exe
    "C:\Users\Admin\AppData\Local\Temp\117df22c3509702a54a9f97fcd27768d.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4004
    • C:\Users\Admin\AppData\Local\Temp\n6622\s6622.exe
      "C:\Users\Admin\AppData\Local\Temp\n6622\s6622.exe" a299da864c2a1171319ffd1emTWQTctauAIoAJqmDVVhMt0HlwnsyTuGYN6Vrz1oy0DIQ7Ojrgcac8ksaha8V1OWLQ0L6XeB4ek4aZzo9tYCYFOwus/nFN7w5KafogBQ63riZLdcn5OAwliCM+uohWMS3wHZMm1k62HYxWrtwTdrhuq7czHGlonxrs3PWw== /v "C:\Users\Admin\AppData\Local\Temp\117df22c3509702a54a9f97fcd27768d.exe" /a
      2⤵
      • Executes dropped EXE
      • Drops desktop.ini file(s)
      • Drops file in Windows directory
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4008

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\n6622\s6622.exe

    Filesize

    351KB

    MD5

    efbfdf1fc17841c857024c99eefe4711

    SHA1

    368bbca1e13b869e3daa63eedf1630c0a418e472

    SHA256

    77e44b6cf973c1b5e70889954dd449baf943d4bfa31a659fb149cf2e93ebd437

    SHA512

    5e5306bbc20439bb73ab63c472a720c3401805e5f3b3737d461e7c8f592eec478550521e1007c5f3c24740f1afc242698d91ac68d8d686c28292a0a37185e1d5

  • memory/4008-13-0x0000000000D40000-0x0000000000D50000-memory.dmp

    Filesize

    64KB

  • memory/4008-12-0x00007FFAE5330000-0x00007FFAE5CD1000-memory.dmp

    Filesize

    9.6MB

  • memory/4008-27-0x000000001C220000-0x000000001C6EE000-memory.dmp

    Filesize

    4.8MB

  • memory/4008-28-0x000000001C6F0000-0x000000001C78C000-memory.dmp

    Filesize

    624KB

  • memory/4008-24-0x000000001B6C0000-0x000000001B6D0000-memory.dmp

    Filesize

    64KB

  • memory/4008-29-0x000000001C8A0000-0x000000001C902000-memory.dmp

    Filesize

    392KB

  • memory/4008-31-0x0000000000D40000-0x0000000000D50000-memory.dmp

    Filesize

    64KB

  • memory/4008-30-0x0000000000D40000-0x0000000000D50000-memory.dmp

    Filesize

    64KB

  • memory/4008-32-0x00007FFAE5330000-0x00007FFAE5CD1000-memory.dmp

    Filesize

    9.6MB

  • memory/4008-33-0x0000000000D40000-0x0000000000D50000-memory.dmp

    Filesize

    64KB

  • memory/4008-34-0x0000000020DA0000-0x00000000212AE000-memory.dmp

    Filesize

    5.1MB

  • memory/4008-36-0x00007FFAE5330000-0x00007FFAE5CD1000-memory.dmp

    Filesize

    9.6MB