Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
177s -
max time network
187s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 04:43
Static task
static1
Behavioral task
behavioral1
Sample
05d269bf444039a67a4f672c3f3e8add.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
05d269bf444039a67a4f672c3f3e8add.exe
Resource
win10v2004-20231215-en
General
-
Target
05d269bf444039a67a4f672c3f3e8add.exe
-
Size
1.0MB
-
MD5
05d269bf444039a67a4f672c3f3e8add
-
SHA1
b477973cfa7b35ab7b757be6f1ea691ea73912d0
-
SHA256
29d6cc5359edb9b0e33c13dbc9db1c8d5defc0eb76c78cc77b6e941fcb202452
-
SHA512
dabfc2f0fc57d7813786f1861b1d4f09e80b538b89943b9dbb8ae3324e8e8f94b387dfabf22fcec9545fd2117640086c9698141c1f18f4f31b17bfc3669c91c3
-
SSDEEP
24576:TWfAedhvZ95Paor1WmDQT3DsZq7iHEPT02NNeiNCA7mY0:T0vZ95PvWR7wdEjNC
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Control Panel\International\Geo\Nation 05d269bf444039a67a4f672c3f3e8add.exe -
Executes dropped EXE 1 IoCs
pid Process 864 05745425.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\05745425 = "C:\\ProgramData\\05745425\\05745425.exe" 05d269bf444039a67a4f672c3f3e8add.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\05745425 = "C:\\PROGRA~3\\05745425\\05745425.exe" 05745425.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 864 05745425.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
pid Process 864 05745425.exe 864 05745425.exe 864 05745425.exe 864 05745425.exe 864 05745425.exe 864 05745425.exe 864 05745425.exe 864 05745425.exe -
Suspicious use of SendNotifyMessage 8 IoCs
pid Process 864 05745425.exe 864 05745425.exe 864 05745425.exe 864 05745425.exe 864 05745425.exe 864 05745425.exe 864 05745425.exe 864 05745425.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4600 wrote to memory of 1472 4600 05d269bf444039a67a4f672c3f3e8add.exe 88 PID 4600 wrote to memory of 1472 4600 05d269bf444039a67a4f672c3f3e8add.exe 88 PID 4600 wrote to memory of 1472 4600 05d269bf444039a67a4f672c3f3e8add.exe 88 PID 1472 wrote to memory of 3644 1472 cmd.exe 90 PID 1472 wrote to memory of 3644 1472 cmd.exe 90 PID 1472 wrote to memory of 3644 1472 cmd.exe 90 PID 3644 wrote to memory of 864 3644 cmd.exe 91 PID 3644 wrote to memory of 864 3644 cmd.exe 91 PID 3644 wrote to memory of 864 3644 cmd.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\05d269bf444039a67a4f672c3f3e8add.exe"C:\Users\Admin\AppData\Local\Temp\05d269bf444039a67a4f672c3f3e8add.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\ProgramData\05745425\05745425.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\SysWOW64\cmd.execmd.exe /c start C:\PROGRA~3\05745425\05745425.exe /install3⤵
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\PROGRA~3\05745425\05745425.exeC:\PROGRA~3\05745425\05745425.exe /install4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:864
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
855KB
MD5cf0507aa58653688a07e1542abf67f58
SHA19cb3b4e8f858364ad94e912f1e5540bf181e9332
SHA256e83710f18581adb967cd0ae01bd07093add68d0437f52296875b314cf115be4f
SHA512df543dacaf655a1954cbe6a42320405ea1182f29dbf91e5cb69f7477ab7dbc18305758dcfb21f92285f4956ff2ab144aa89bf94ab529a8bb5dcc187473ddaff0
-
Filesize
236B
MD5d25f24c073ca06aa8a13209a813f0743
SHA1cc83efb9b9c6406a8e308f2da3c9e8723c4808f1
SHA2564f570992421664db7a91f599c6a2a94dd6e91328075a4943b34215a56a1933ca
SHA512a74d474bf8991cb08e11da46a615dd47d7d510dde8a7f3f110b415cd692645665dfd387cbff4279914f6ad636db9912d340da6ad061186994b79db12043f3dd2
-
Filesize
1.0MB
MD505d269bf444039a67a4f672c3f3e8add
SHA1b477973cfa7b35ab7b757be6f1ea691ea73912d0
SHA25629d6cc5359edb9b0e33c13dbc9db1c8d5defc0eb76c78cc77b6e941fcb202452
SHA512dabfc2f0fc57d7813786f1861b1d4f09e80b538b89943b9dbb8ae3324e8e8f94b387dfabf22fcec9545fd2117640086c9698141c1f18f4f31b17bfc3669c91c3