Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 01:13
Static task
static1
Behavioral task
behavioral1
Sample
1f9c28b92df8cdcb416fd3b68120440b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1f9c28b92df8cdcb416fd3b68120440b.exe
Resource
win10v2004-20231215-en
General
-
Target
1f9c28b92df8cdcb416fd3b68120440b.exe
-
Size
68KB
-
MD5
1f9c28b92df8cdcb416fd3b68120440b
-
SHA1
0f299b85b7aa004cbc0a73bd050f297e025ae642
-
SHA256
7912c412dbd5766df4364c6b0c8131ad360b67e68aaad376dfd76625b71a3e6d
-
SHA512
09edd72350e58e353951ab5076caeca29a8faa3e976937c6a5b5612747b840d1740af206208741899c0f40f634237e98c1d20635e72fc6aa8ca03d1fe37a966a
-
SSDEEP
1536:4agFotbi68CUACfARwnMxmvRdwHbrLFd9Y:Kotbi7CRYpn/vRipd9Y
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Control Panel\International\Geo\Nation 1f9c28b92df8cdcb416fd3b68120440b.exe -
resource yara_rule behavioral2/memory/4752-2-0x0000000000400000-0x0000000000423000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4752 wrote to memory of 1956 4752 1f9c28b92df8cdcb416fd3b68120440b.exe 105 PID 4752 wrote to memory of 1956 4752 1f9c28b92df8cdcb416fd3b68120440b.exe 105 PID 4752 wrote to memory of 1956 4752 1f9c28b92df8cdcb416fd3b68120440b.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\1f9c28b92df8cdcb416fd3b68120440b.exe"C:\Users\Admin\AppData\Local\Temp\1f9c28b92df8cdcb416fd3b68120440b.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\a..bat" > nul 2> nul2⤵PID:1956
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210B
MD54172c9fe58b737bce7b38c60148edc04
SHA19c019fddc34644ca23be4fc26dac2522d96d8863
SHA256646d5340d1db08aa33bf3a02a172953ecd22ed9b6d79c04769dc2e769702adbd
SHA5126c6b49f0733ef2ace6c0bd80b5ecb0d059a2348c592a2ee7b8b83cc7c8bda847a6274298994472a47a8007fb61fa4c6d79e6c07bb4f3873d261cf959e22f1361