Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2023, 05:59

General

  • Target

    09e37a23dd5f0c538e21b93d88c91d58.exe

  • Size

    17KB

  • MD5

    09e37a23dd5f0c538e21b93d88c91d58

  • SHA1

    6f26b5fc312b5cbeb801902345193fa173bac146

  • SHA256

    fa8f0c50ab3d1ed1aa504d2d281b4805d4e26a440446e791f49eea40000c4a34

  • SHA512

    691dd7a77094d12e36fc303e2de9ac779bcb833ce0ac64427fcf82764b0501c8a35b9b96e8be3846612a0d80fbdf9907cb78b871a638acf8874e3970229b54fa

  • SSDEEP

    192:u+ofuFL1iFkHGPy2gXxmavWHKpYKR0UtH2anpMBoYht4f91B:u+UuN1kg7x9WHkYK5t24ptt7B

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\09e37a23dd5f0c538e21b93d88c91d58.exe
    "C:\Users\Admin\AppData\Local\Temp\09e37a23dd5f0c538e21b93d88c91d58.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:216
    • C:\Users\Admin\AppData\Local\Temp\pdfupdate.exe
      "C:\Users\Admin\AppData\Local\Temp\pdfupdate.exe"
      2⤵
      • Executes dropped EXE
      PID:4636

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\pdfupdate.exe

    Filesize

    17KB

    MD5

    c64cf326312d8cb69c8ef071381f998d

    SHA1

    2629d1a3bae6707d319721e7c6bc2701b2fca999

    SHA256

    44a709a4f3079b828fc2a76f175240827e3e2efb6f9a91902f957db16e74ecc8

    SHA512

    157beaa8ecf8fba0cdead0b890cd85cc727ecb1167e235da28a93236fa05d20f6de58fa85829d5cdfeea92f18b44283613ad607dfd6f9e0278c68da4902dd7b8

  • memory/216-0-0x0000000000C40000-0x0000000000C48000-memory.dmp

    Filesize

    32KB

  • memory/4636-9-0x0000000000C20000-0x0000000000C28000-memory.dmp

    Filesize

    32KB