Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
162s -
max time network
204s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 05:46
Static task
static1
Behavioral task
behavioral1
Sample
09222dcab9167f4a748c4d3e457aa31c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
09222dcab9167f4a748c4d3e457aa31c.exe
Resource
win10v2004-20231215-en
General
-
Target
09222dcab9167f4a748c4d3e457aa31c.exe
-
Size
32KB
-
MD5
09222dcab9167f4a748c4d3e457aa31c
-
SHA1
bcac93f663dae855af7305bf3528d8fcbd513fa8
-
SHA256
caadc15e19e5784d06d6b488a5b2a98e2f4832d1c4381a73d1b28c0072175b18
-
SHA512
8335485dafe5176dcea1aeb531716d992d7a330402efdaac7b34a9c3102a5dfdaa99a287d38380ffbe1393f0207acb91bc653190ffc5d28301c956f7cc847533
-
SSDEEP
768:sccccccccccccccccccccccKcccccccccccccccccccccc0ccccccccccccccccD:sccccccccccccccccccccccKcccccccD
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Control Panel\International\Geo\Nation 09222dcab9167f4a748c4d3e457aa31c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2980 09222dcab9167f4a748c4d3e457aa31c.exe 2980 09222dcab9167f4a748c4d3e457aa31c.exe 2980 09222dcab9167f4a748c4d3e457aa31c.exe 2980 09222dcab9167f4a748c4d3e457aa31c.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2980 09222dcab9167f4a748c4d3e457aa31c.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2980 wrote to memory of 4880 2980 09222dcab9167f4a748c4d3e457aa31c.exe 93 PID 2980 wrote to memory of 4880 2980 09222dcab9167f4a748c4d3e457aa31c.exe 93 PID 2980 wrote to memory of 4880 2980 09222dcab9167f4a748c4d3e457aa31c.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\09222dcab9167f4a748c4d3e457aa31c.exe"C:\Users\Admin\AppData\Local\Temp\09222dcab9167f4a748c4d3e457aa31c.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\09222D~1.EXE > nul2⤵PID:4880
-