Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 22:07
Behavioral task
behavioral1
Sample
3f011cab6fe29c299d6e45fc128e9bd6.exe
Resource
win7-20231215-en
General
-
Target
3f011cab6fe29c299d6e45fc128e9bd6.exe
-
Size
104KB
-
MD5
3f011cab6fe29c299d6e45fc128e9bd6
-
SHA1
86b2cae2ddac6744a030b7a91e6743c27b07b439
-
SHA256
42b20fdce052f2a7d95df1bd8f344dec26d0caea679289bce70b80e1e2190d6c
-
SHA512
aefa1f3bdd5d92f158cdd076ae5b639b5906484ab76beed73a4ae44baf89951fbaf571fb4ae9a6fe22aa937e3202490eb15c6b235bb2ae8838027c5d06b3d991
-
SSDEEP
3072:I15T3Ncy/RpISCs2EWFrphy2G5mZ5E+HIbZoutlO:I15T9cy/RpIvuWXhy2v5abZoSlO
Malware Config
Signatures
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation 3f011cab6fe29c299d6e45fc128e9bd6.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/2804-0-0x0000000000400000-0x000000000043D000-memory.dmp upx behavioral2/memory/2804-41-0x0000000000400000-0x000000000043D000-memory.dmp upx behavioral2/memory/3588-42-0x0000000000400000-0x000000000043D000-memory.dmp upx behavioral2/memory/2804-69-0x0000000000400000-0x000000000043D000-memory.dmp upx -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files (x86)\Zona\utils.jar 3f011cab6fe29c299d6e45fc128e9bd6.exe File created C:\Program Files (x86)\Zona\License_ru.rtf 3f011cab6fe29c299d6e45fc128e9bd6.exe File created C:\Program Files (x86)\Zona\License_uk.rtf 3f011cab6fe29c299d6e45fc128e9bd6.exe File created C:\Program Files (x86)\Zona\License_en.rtf 3f011cab6fe29c299d6e45fc128e9bd6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2804 wrote to memory of 3588 2804 3f011cab6fe29c299d6e45fc128e9bd6.exe 90 PID 2804 wrote to memory of 3588 2804 3f011cab6fe29c299d6e45fc128e9bd6.exe 90 PID 2804 wrote to memory of 3588 2804 3f011cab6fe29c299d6e45fc128e9bd6.exe 90 PID 2804 wrote to memory of 1796 2804 3f011cab6fe29c299d6e45fc128e9bd6.exe 95 PID 2804 wrote to memory of 1796 2804 3f011cab6fe29c299d6e45fc128e9bd6.exe 95 PID 2804 wrote to memory of 1796 2804 3f011cab6fe29c299d6e45fc128e9bd6.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f011cab6fe29c299d6e45fc128e9bd6.exe"C:\Users\Admin\AppData\Local\Temp\3f011cab6fe29c299d6e45fc128e9bd6.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\3f011cab6fe29c299d6e45fc128e9bd6.exe"C:\Users\Admin\AppData\Local\Temp\3f011cab6fe29c299d6e45fc128e9bd6.exe" /asService2⤵
- Drops file in Program Files directory
PID:3588
-
-
C:\Windows\SysWOW64\cscript.execscript //NoLogo C:\Users\Admin\AppData\Local\Temp\hd.vbs2⤵PID:1796
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c9c71f80f4c61e8109a9afde0fce197b
SHA1ea9e9345e387606579ba11a3da7c4f71dbb462a2
SHA256ed7fa5ed7aa6e1742703d17fd7070417a929ffad80fcf0f040fb2338283a9576
SHA512c8d7ce58803eabc5a8d9baedffef51afc0f4868cb8874debfce89bd7f6329655fb5b2e191dbca793d2311207b16e5c0a13aa0780288911c322f44773cf15b388
-
Filesize
1KB
MD53905abefb79a454ea4af7828809e9a94
SHA1b49aa6987d3f988dc1f3bac262d308c5495d7c0f
SHA25684bd613a3b1211ee43025b040f73972b163c0a638180faacac8dc238e50319b7
SHA512816e59b5fb9734aea3e1780cdd25ffea2e30af201bcff35ef2e2b48b20025e0431e4b27894cdf677bddd8e33f205df21e8f73c7816fb524a20dac094cdccbd8a
-
Filesize
245B
MD5d8682d715a652f994dca50509fd09669
SHA1bb03cf242964028b5d9183812ed8b04de9d55c6e
SHA2564bd3521fb2b5c48fe318a874bf64c6b1f62f5212b8c88790006cafaf31d207ba
SHA512eaa39d87002df1eea16b215c9f099731253b7af72e46b12f64423874dbcdd8f68a164d7641bafb3f854aa6ad8aa7269da59ed0b32cd41eccba5d6f296f9a52ca
-
Filesize
214B
MD5758b075a09774272c72ec87da581a2f0
SHA14f195274d115b4ad33702ececf0bcbd5211a0633
SHA256694ea318a3b3a052c17800dc2ed45641638bb0bec3d026b263a07d6d0a27bcf7
SHA512120e9dc1dd00dcb4091897b1d0626362709e79ea1ce2ec61d2b9c4d7cea31c92f3fa79ff76e2c107c9352d892f879d68c5da2e8c48f6f616ef28b714b8ebb557