Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2023, 11:47

General

  • Target

    1be2af9622fee884702deb028fce4462.exe

  • Size

    37KB

  • MD5

    1be2af9622fee884702deb028fce4462

  • SHA1

    7e0c274134fcd4d8d253d74c99ec7c0fb0ae9a20

  • SHA256

    7dfd70d26f9a6bc56292a85d54ecce8db2119a1098b58d31ce3929cf8a8d81ec

  • SHA512

    ab76045beea67d54e4c5ca1c44973e12d658883e02e034140f9bd77776b6a292555eca9a573a3be7e3571f8da676421a02cbc71d487273a8f04394937642f8cf

  • SSDEEP

    768:q9gdbP932YxsI+aY7hhnshh7tQzbBiy5UU3JoXa6Fi90Q/OTi3WqjUv8rjPHV:jbP8xG6piy6U3OXamm3/h3nQGB

Score
7/10
upx

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3524
      • C:\Users\Admin\AppData\Local\Temp\1be2af9622fee884702deb028fce4462.exe
        "C:\Users\Admin\AppData\Local\Temp\1be2af9622fee884702deb028fce4462.exe"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3516
        • C:\Users\Admin\AppData\Local\Temp\1be2af9622fee884702deb028fce4462.exe
          C:\Users\Admin\AppData\Local\Temp\1be2af9622fee884702deb028fce4462.exe b
          3⤵
          • Checks computer location settings
          • Drops file in System32 directory
          • Drops file in Windows directory
          • Suspicious use of WriteProcessMemory
          PID:2984
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\1be2af9622fee884702deb028fce4462.exe b
            4⤵
              PID:4124

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/2984-1-0x0000000013140000-0x0000000013160000-memory.dmp

        Filesize

        128KB

      • memory/2984-9-0x0000000013140000-0x0000000013160000-memory.dmp

        Filesize

        128KB

      • memory/3516-0-0x0000000013140000-0x0000000013160000-memory.dmp

        Filesize

        128KB

      • memory/3516-2-0x0000000013140000-0x0000000013160000-memory.dmp

        Filesize

        128KB