Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
196s -
max time network
211s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 11:22
Static task
static1
Behavioral task
behavioral1
Sample
1a7bd3bb85833f8ed51f478e024af1b7.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1a7bd3bb85833f8ed51f478e024af1b7.exe
Resource
win10v2004-20231215-en
General
-
Target
1a7bd3bb85833f8ed51f478e024af1b7.exe
-
Size
322KB
-
MD5
1a7bd3bb85833f8ed51f478e024af1b7
-
SHA1
a3003e285ce0f7c04ea142351d581235e75e52aa
-
SHA256
5851bf0214f12c68579c9b333ee5ed37b6ec5a9afebd519bd37aac0c3a25ea40
-
SHA512
994117914190c32a71af59be095ab24569c1896b6dd7768f8247af4831ceb42dacc62e0ee90b09da2412c455f05973ef9d9efcc01cd631596e728d17ef7d583c
-
SSDEEP
6144:Z/FjEVIUAbAoeKqv5ScGaBD00Daf6E36SfVFZDedW7J/h8O7o1r:ZREVI7bk/FVlDaf336SnZDj7php0
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Control Panel\International\Geo\Nation 1a7bd3bb85833f8ed51f478e024af1b7.exe -
Executes dropped EXE 1 IoCs
pid Process 1252 1a7bd3bb85833f8ed51f478e024af1b7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 5028 1a7bd3bb85833f8ed51f478e024af1b7.exe 5028 1a7bd3bb85833f8ed51f478e024af1b7.exe 5028 1a7bd3bb85833f8ed51f478e024af1b7.exe 5028 1a7bd3bb85833f8ed51f478e024af1b7.exe 5028 1a7bd3bb85833f8ed51f478e024af1b7.exe 5028 1a7bd3bb85833f8ed51f478e024af1b7.exe 5028 1a7bd3bb85833f8ed51f478e024af1b7.exe 5028 1a7bd3bb85833f8ed51f478e024af1b7.exe 5028 1a7bd3bb85833f8ed51f478e024af1b7.exe 5028 1a7bd3bb85833f8ed51f478e024af1b7.exe 5028 1a7bd3bb85833f8ed51f478e024af1b7.exe 5028 1a7bd3bb85833f8ed51f478e024af1b7.exe 5028 1a7bd3bb85833f8ed51f478e024af1b7.exe 5028 1a7bd3bb85833f8ed51f478e024af1b7.exe 5028 1a7bd3bb85833f8ed51f478e024af1b7.exe 5028 1a7bd3bb85833f8ed51f478e024af1b7.exe 5028 1a7bd3bb85833f8ed51f478e024af1b7.exe 5028 1a7bd3bb85833f8ed51f478e024af1b7.exe 5028 1a7bd3bb85833f8ed51f478e024af1b7.exe 5028 1a7bd3bb85833f8ed51f478e024af1b7.exe 5028 1a7bd3bb85833f8ed51f478e024af1b7.exe 5028 1a7bd3bb85833f8ed51f478e024af1b7.exe 5028 1a7bd3bb85833f8ed51f478e024af1b7.exe 1252 1a7bd3bb85833f8ed51f478e024af1b7.exe 1252 1a7bd3bb85833f8ed51f478e024af1b7.exe 1252 1a7bd3bb85833f8ed51f478e024af1b7.exe 1252 1a7bd3bb85833f8ed51f478e024af1b7.exe 1252 1a7bd3bb85833f8ed51f478e024af1b7.exe 1252 1a7bd3bb85833f8ed51f478e024af1b7.exe 1252 1a7bd3bb85833f8ed51f478e024af1b7.exe 1252 1a7bd3bb85833f8ed51f478e024af1b7.exe 1252 1a7bd3bb85833f8ed51f478e024af1b7.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 5028 1a7bd3bb85833f8ed51f478e024af1b7.exe Token: SeDebugPrivilege 1252 1a7bd3bb85833f8ed51f478e024af1b7.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5028 wrote to memory of 1252 5028 1a7bd3bb85833f8ed51f478e024af1b7.exe 101 PID 5028 wrote to memory of 1252 5028 1a7bd3bb85833f8ed51f478e024af1b7.exe 101 PID 5028 wrote to memory of 1252 5028 1a7bd3bb85833f8ed51f478e024af1b7.exe 101 PID 5028 wrote to memory of 1668 5028 1a7bd3bb85833f8ed51f478e024af1b7.exe 102 PID 5028 wrote to memory of 1668 5028 1a7bd3bb85833f8ed51f478e024af1b7.exe 102 PID 5028 wrote to memory of 1668 5028 1a7bd3bb85833f8ed51f478e024af1b7.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\1a7bd3bb85833f8ed51f478e024af1b7.exe"C:\Users\Admin\AppData\Local\Temp\1a7bd3bb85833f8ed51f478e024af1b7.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Users\Admin\AppData\Local\Temp\1a7bd3bb85833f8ed51f478e024af1b7\1a7bd3bb85833f8ed51f478e024af1b7.exe"C:\Users\Admin\AppData\Local\Temp\1a7bd3bb85833f8ed51f478e024af1b7\1a7bd3bb85833f8ed51f478e024af1b7.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1252
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 1000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\1a7bd3bb85833f8ed51f478e024af1b7.exe"2⤵PID:1668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\1a7bd3bb85833f8ed51f478e024af1b7\1a7bd3bb85833f8ed51f478e024af1b7.exe
Filesize322KB
MD51a7bd3bb85833f8ed51f478e024af1b7
SHA1a3003e285ce0f7c04ea142351d581235e75e52aa
SHA2565851bf0214f12c68579c9b333ee5ed37b6ec5a9afebd519bd37aac0c3a25ea40
SHA512994117914190c32a71af59be095ab24569c1896b6dd7768f8247af4831ceb42dacc62e0ee90b09da2412c455f05973ef9d9efcc01cd631596e728d17ef7d583c