Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    145s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2023, 02:44

General

  • Target

    00b69dbecc92380c94c702ccdf6615f0.exe

  • Size

    79KB

  • MD5

    00b69dbecc92380c94c702ccdf6615f0

  • SHA1

    5dae9fc593745cdebf1a632918942f9844b32072

  • SHA256

    b7974a716ea1e2d979d904b3d0a0fd91c7cbcabb3c3eac52a8542c523a91e076

  • SHA512

    33ad80fd96289a1254bcf1d0d8fc2c931f4ce072039af5ee5498a63b15fe94cc56a3752a50e03cd3784317f906c4ee6c0f2c77f60389f1c9638b880c0ff4e4f4

  • SSDEEP

    1536:zYt90Z3i3M3IgEzak71cwD+s28XvA02+9HAE98c+IMhtLEA:e0Zy3M3IgkaYcw/HvpKK8c+7hF

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\00b69dbecc92380c94c702ccdf6615f0.exe
    "C:\Users\Admin\AppData\Local\Temp\00b69dbecc92380c94c702ccdf6615f0.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:1616
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\acfxaccj.bat" "
      2⤵
        PID:1748
      • C:\Windows\SysWOW64\winIogon.exe
        C:\Windows\system32\winIogon.exe
        2⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Drops file in System32 directory
        PID:4952

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\acfxaccj.bat

      Filesize

      202B

      MD5

      c844bbcd9d2c677382519f393b4ebcd7

      SHA1

      81aacee6477b737a8f384c9e66e7329fa5cd6edc

      SHA256

      d11bf7f57e21ef1a0f14c61ea2a06699d30bbccd6bedd607ea3087012f227a06

      SHA512

      3b38b7b300b52f5f21c2ebdf3268e6804f89c1747a45047dd29462e0840ea6e56fce7c9ed6b2053a288a7caf09e902bd34faec64093c10a670087d1799167a2c

    • C:\Windows\SysWOW64\winIogon.exe

      Filesize

      79KB

      MD5

      00b69dbecc92380c94c702ccdf6615f0

      SHA1

      5dae9fc593745cdebf1a632918942f9844b32072

      SHA256

      b7974a716ea1e2d979d904b3d0a0fd91c7cbcabb3c3eac52a8542c523a91e076

      SHA512

      33ad80fd96289a1254bcf1d0d8fc2c931f4ce072039af5ee5498a63b15fe94cc56a3752a50e03cd3784317f906c4ee6c0f2c77f60389f1c9638b880c0ff4e4f4

    • C:\Windows\SysWOW64\winIogon.exe

      Filesize

      64KB

      MD5

      09f2da10ec049f61b87c7dc1da9f441b

      SHA1

      68b6b1f230cb0e8a29cec72a268ee2b32b200b1d

      SHA256

      b68881e13e0cba3f2c5aa7946eecfbc56c304bd8da7143aaf9ffcd01eb179c6e

      SHA512

      85897195b0da10ae845db274873471711dcbb051086bdd8160b91bc257dced7b6bb7cdf1afc14fe2768f4924e0ef873bfb61d85b865191b720ba5d95c4dce6d8

    • memory/1616-0-0x0000000000400000-0x0000000000932000-memory.dmp

      Filesize

      5.2MB

    • memory/1616-1-0x0000000000AA0000-0x0000000000AA2000-memory.dmp

      Filesize

      8KB

    • memory/1616-12-0x0000000000400000-0x0000000000932000-memory.dmp

      Filesize

      5.2MB

    • memory/4952-13-0x0000000000400000-0x0000000000932000-memory.dmp

      Filesize

      5.2MB

    • memory/4952-14-0x0000000002400000-0x0000000002402000-memory.dmp

      Filesize

      8KB

    • memory/4952-16-0x0000000000400000-0x0000000000932000-memory.dmp

      Filesize

      5.2MB

    • memory/4952-22-0x0000000000400000-0x0000000000932000-memory.dmp

      Filesize

      5.2MB