Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 02:44
Static task
static1
Behavioral task
behavioral1
Sample
00b69dbecc92380c94c702ccdf6615f0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
00b69dbecc92380c94c702ccdf6615f0.exe
Resource
win10v2004-20231215-en
General
-
Target
00b69dbecc92380c94c702ccdf6615f0.exe
-
Size
79KB
-
MD5
00b69dbecc92380c94c702ccdf6615f0
-
SHA1
5dae9fc593745cdebf1a632918942f9844b32072
-
SHA256
b7974a716ea1e2d979d904b3d0a0fd91c7cbcabb3c3eac52a8542c523a91e076
-
SHA512
33ad80fd96289a1254bcf1d0d8fc2c931f4ce072039af5ee5498a63b15fe94cc56a3752a50e03cd3784317f906c4ee6c0f2c77f60389f1c9638b880c0ff4e4f4
-
SSDEEP
1536:zYt90Z3i3M3IgEzak71cwD+s28XvA02+9HAE98c+IMhtLEA:e0Zy3M3IgkaYcw/HvpKK8c+7hF
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation 00b69dbecc92380c94c702ccdf6615f0.exe -
Executes dropped EXE 1 IoCs
pid Process 4952 winIogon.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows DLL Loader = "C:\\Windows\\system32\\winIogon.exe" winIogon.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\winIogon.exe 00b69dbecc92380c94c702ccdf6615f0.exe File opened for modification C:\Windows\SysWOW64\winIogon.exe 00b69dbecc92380c94c702ccdf6615f0.exe File created C:\Windows\SysWOW64\explorer.exe winIogon.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1616 wrote to memory of 1748 1616 00b69dbecc92380c94c702ccdf6615f0.exe 91 PID 1616 wrote to memory of 1748 1616 00b69dbecc92380c94c702ccdf6615f0.exe 91 PID 1616 wrote to memory of 1748 1616 00b69dbecc92380c94c702ccdf6615f0.exe 91 PID 1616 wrote to memory of 4952 1616 00b69dbecc92380c94c702ccdf6615f0.exe 92 PID 1616 wrote to memory of 4952 1616 00b69dbecc92380c94c702ccdf6615f0.exe 92 PID 1616 wrote to memory of 4952 1616 00b69dbecc92380c94c702ccdf6615f0.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\00b69dbecc92380c94c702ccdf6615f0.exe"C:\Users\Admin\AppData\Local\Temp\00b69dbecc92380c94c702ccdf6615f0.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\acfxaccj.bat" "2⤵PID:1748
-
-
C:\Windows\SysWOW64\winIogon.exeC:\Windows\system32\winIogon.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:4952
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
202B
MD5c844bbcd9d2c677382519f393b4ebcd7
SHA181aacee6477b737a8f384c9e66e7329fa5cd6edc
SHA256d11bf7f57e21ef1a0f14c61ea2a06699d30bbccd6bedd607ea3087012f227a06
SHA5123b38b7b300b52f5f21c2ebdf3268e6804f89c1747a45047dd29462e0840ea6e56fce7c9ed6b2053a288a7caf09e902bd34faec64093c10a670087d1799167a2c
-
Filesize
79KB
MD500b69dbecc92380c94c702ccdf6615f0
SHA15dae9fc593745cdebf1a632918942f9844b32072
SHA256b7974a716ea1e2d979d904b3d0a0fd91c7cbcabb3c3eac52a8542c523a91e076
SHA51233ad80fd96289a1254bcf1d0d8fc2c931f4ce072039af5ee5498a63b15fe94cc56a3752a50e03cd3784317f906c4ee6c0f2c77f60389f1c9638b880c0ff4e4f4
-
Filesize
64KB
MD509f2da10ec049f61b87c7dc1da9f441b
SHA168b6b1f230cb0e8a29cec72a268ee2b32b200b1d
SHA256b68881e13e0cba3f2c5aa7946eecfbc56c304bd8da7143aaf9ffcd01eb179c6e
SHA51285897195b0da10ae845db274873471711dcbb051086bdd8160b91bc257dced7b6bb7cdf1afc14fe2768f4924e0ef873bfb61d85b865191b720ba5d95c4dce6d8