Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 08:05
Behavioral task
behavioral1
Sample
10e1016e1493f4fe4d1beaa94b2873d7.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
10e1016e1493f4fe4d1beaa94b2873d7.exe
Resource
win10v2004-20231215-en
General
-
Target
10e1016e1493f4fe4d1beaa94b2873d7.exe
-
Size
43KB
-
MD5
10e1016e1493f4fe4d1beaa94b2873d7
-
SHA1
28a77d75c6379ad6e33dbc776d0a90ac46d24844
-
SHA256
cf3a974b073a510285cc49223ceb0b23d24b5b29b6562e32ea4540f3c82bf0a7
-
SHA512
66037835663c14d93420bc630b21d5b93a84699fe42cc8cfbc21907610c1305444b3a6c29990b14a006f509ba243fa061219d8a22eae0a8e338355b290de9c28
-
SSDEEP
768:BcL22h+SkmVeJ4zfwcl+oou2C0EStY3CxyLMQH+5JBe033yf:GTLkmXzj3o3CqtY384H+5JBe03if
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation 10e1016e1493f4fe4d1beaa94b2873d7.exe -
Executes dropped EXE 1 IoCs
pid Process 1368 EXPL0RER.EXE -
resource yara_rule behavioral2/memory/3776-0-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/files/0x000f000000023138-9.dat upx behavioral2/memory/3776-39-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/1368-40-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/1368-45-0x0000000000400000-0x0000000000421000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\EXPL0RER.EXE 10e1016e1493f4fe4d1beaa94b2873d7.exe File opened for modification C:\Windows\SysWOW64\EXPL0RER.EXE 10e1016e1493f4fe4d1beaa94b2873d7.exe File created C:\Windows\SysWOW64\SP00LSV.EXE 10e1016e1493f4fe4d1beaa94b2873d7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 10e1016e1493f4fe4d1beaa94b2873d7.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3776 10e1016e1493f4fe4d1beaa94b2873d7.exe 3776 10e1016e1493f4fe4d1beaa94b2873d7.exe 3776 10e1016e1493f4fe4d1beaa94b2873d7.exe 3776 10e1016e1493f4fe4d1beaa94b2873d7.exe 3776 10e1016e1493f4fe4d1beaa94b2873d7.exe 3776 10e1016e1493f4fe4d1beaa94b2873d7.exe 3776 10e1016e1493f4fe4d1beaa94b2873d7.exe 3776 10e1016e1493f4fe4d1beaa94b2873d7.exe 3776 10e1016e1493f4fe4d1beaa94b2873d7.exe 3776 10e1016e1493f4fe4d1beaa94b2873d7.exe 3776 10e1016e1493f4fe4d1beaa94b2873d7.exe 3776 10e1016e1493f4fe4d1beaa94b2873d7.exe 3776 10e1016e1493f4fe4d1beaa94b2873d7.exe 3776 10e1016e1493f4fe4d1beaa94b2873d7.exe 3776 10e1016e1493f4fe4d1beaa94b2873d7.exe 3776 10e1016e1493f4fe4d1beaa94b2873d7.exe 3776 10e1016e1493f4fe4d1beaa94b2873d7.exe 3776 10e1016e1493f4fe4d1beaa94b2873d7.exe 3776 10e1016e1493f4fe4d1beaa94b2873d7.exe 3776 10e1016e1493f4fe4d1beaa94b2873d7.exe 3776 10e1016e1493f4fe4d1beaa94b2873d7.exe 3776 10e1016e1493f4fe4d1beaa94b2873d7.exe 3776 10e1016e1493f4fe4d1beaa94b2873d7.exe 3776 10e1016e1493f4fe4d1beaa94b2873d7.exe 3776 10e1016e1493f4fe4d1beaa94b2873d7.exe 3776 10e1016e1493f4fe4d1beaa94b2873d7.exe 3776 10e1016e1493f4fe4d1beaa94b2873d7.exe 3776 10e1016e1493f4fe4d1beaa94b2873d7.exe 3776 10e1016e1493f4fe4d1beaa94b2873d7.exe 3776 10e1016e1493f4fe4d1beaa94b2873d7.exe 3776 10e1016e1493f4fe4d1beaa94b2873d7.exe 3776 10e1016e1493f4fe4d1beaa94b2873d7.exe 3776 10e1016e1493f4fe4d1beaa94b2873d7.exe 3776 10e1016e1493f4fe4d1beaa94b2873d7.exe 3776 10e1016e1493f4fe4d1beaa94b2873d7.exe 3776 10e1016e1493f4fe4d1beaa94b2873d7.exe 3776 10e1016e1493f4fe4d1beaa94b2873d7.exe 3776 10e1016e1493f4fe4d1beaa94b2873d7.exe 3776 10e1016e1493f4fe4d1beaa94b2873d7.exe 3776 10e1016e1493f4fe4d1beaa94b2873d7.exe 3776 10e1016e1493f4fe4d1beaa94b2873d7.exe 3776 10e1016e1493f4fe4d1beaa94b2873d7.exe 3776 10e1016e1493f4fe4d1beaa94b2873d7.exe 3776 10e1016e1493f4fe4d1beaa94b2873d7.exe 3776 10e1016e1493f4fe4d1beaa94b2873d7.exe 3776 10e1016e1493f4fe4d1beaa94b2873d7.exe 3776 10e1016e1493f4fe4d1beaa94b2873d7.exe 3776 10e1016e1493f4fe4d1beaa94b2873d7.exe 3776 10e1016e1493f4fe4d1beaa94b2873d7.exe 3776 10e1016e1493f4fe4d1beaa94b2873d7.exe 3776 10e1016e1493f4fe4d1beaa94b2873d7.exe 3776 10e1016e1493f4fe4d1beaa94b2873d7.exe 3776 10e1016e1493f4fe4d1beaa94b2873d7.exe 3776 10e1016e1493f4fe4d1beaa94b2873d7.exe 3776 10e1016e1493f4fe4d1beaa94b2873d7.exe 3776 10e1016e1493f4fe4d1beaa94b2873d7.exe 3776 10e1016e1493f4fe4d1beaa94b2873d7.exe 3776 10e1016e1493f4fe4d1beaa94b2873d7.exe 3776 10e1016e1493f4fe4d1beaa94b2873d7.exe 3776 10e1016e1493f4fe4d1beaa94b2873d7.exe 3776 10e1016e1493f4fe4d1beaa94b2873d7.exe 3776 10e1016e1493f4fe4d1beaa94b2873d7.exe 3776 10e1016e1493f4fe4d1beaa94b2873d7.exe 3776 10e1016e1493f4fe4d1beaa94b2873d7.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3776 wrote to memory of 1368 3776 10e1016e1493f4fe4d1beaa94b2873d7.exe 92 PID 3776 wrote to memory of 1368 3776 10e1016e1493f4fe4d1beaa94b2873d7.exe 92 PID 3776 wrote to memory of 1368 3776 10e1016e1493f4fe4d1beaa94b2873d7.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\10e1016e1493f4fe4d1beaa94b2873d7.exe"C:\Users\Admin\AppData\Local\Temp\10e1016e1493f4fe4d1beaa94b2873d7.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3776 -
C:\Windows\SysWOW64\EXPL0RER.EXE"C:\Windows\system32\EXPL0RER.EXE" "C:\Users\Admin\AppData\Local\Temp\10e1016e1493f4fe4d1beaa94b2873d7.exe"2⤵
- Executes dropped EXE
PID:1368
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD510e1016e1493f4fe4d1beaa94b2873d7
SHA128a77d75c6379ad6e33dbc776d0a90ac46d24844
SHA256cf3a974b073a510285cc49223ceb0b23d24b5b29b6562e32ea4540f3c82bf0a7
SHA51266037835663c14d93420bc630b21d5b93a84699fe42cc8cfbc21907610c1305444b3a6c29990b14a006f509ba243fa061219d8a22eae0a8e338355b290de9c28
-
Filesize
3KB
MD53d66101a0781f9983a50f24098b82b33
SHA197e86b0953b4aed591717c1c5f1013e29807cefa
SHA25624ea4b268b0ab24de1a846b5fc02f5daf476c18fdbf90040d4245d4ec5b986f1
SHA512d64c391a710b0cbaa1e178a6b142580abc66b3cb2b241e1669ce59cb312e5b08216767546e850c0d677551b82f5816fd4ac1d235c0fb0dc88272a7298ef3a6cf