Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
155s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 16:31
Static task
static1
Behavioral task
behavioral1
Sample
2d55f00fc63f567fbe1b8ad7969b255f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2d55f00fc63f567fbe1b8ad7969b255f.exe
Resource
win10v2004-20231215-en
General
-
Target
2d55f00fc63f567fbe1b8ad7969b255f.exe
-
Size
209KB
-
MD5
2d55f00fc63f567fbe1b8ad7969b255f
-
SHA1
3e4fba8775a72a51ce6236174336ff7ce057088e
-
SHA256
53d40f13ccb6b523fa8349abfd4a0cb6a6b46dadb254b19be95add329101541b
-
SHA512
b05660c104494449eb6e2c0491e9410cb149abc651b4797761e4fd9ed607a48c710252765570aa2b8077ca993fb5f7335da8469985083a54154c6dcc0e2940ba
-
SSDEEP
1536:SNSXbc74YTOnlNSUL09atT0mBBA7aKSvIYFwAfdvoWQO57:SEo75OnPSI09qgmBBAGKSvwovoW99
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Control Panel\International\Geo\Nation 2d55f00fc63f567fbe1b8ad7969b255f.exe -
Executes dropped EXE 1 IoCs
pid Process 2692 jusched.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\1c96db06\jusched.exe 2d55f00fc63f567fbe1b8ad7969b255f.exe File created C:\Program Files (x86)\1c96db06\1c96db06 2d55f00fc63f567fbe1b8ad7969b255f.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\Update23.job 2d55f00fc63f567fbe1b8ad7969b255f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2496 wrote to memory of 2692 2496 2d55f00fc63f567fbe1b8ad7969b255f.exe 97 PID 2496 wrote to memory of 2692 2496 2d55f00fc63f567fbe1b8ad7969b255f.exe 97 PID 2496 wrote to memory of 2692 2496 2d55f00fc63f567fbe1b8ad7969b255f.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d55f00fc63f567fbe1b8ad7969b255f.exe"C:\Users\Admin\AppData\Local\Temp\2d55f00fc63f567fbe1b8ad7969b255f.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Program Files (x86)\1c96db06\jusched.exe"C:\Program Files (x86)\1c96db06\jusched.exe"2⤵
- Executes dropped EXE
PID:2692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17B
MD53330ebaaa7e9f4630f4ad4c156be59d8
SHA140375cf8e68671e0100e725de5cd5c6657b9f722
SHA2562c8451d5dca9e68ec3af7f318c5d874fbdfea9e89e7b5f9922b4dbd65f027e15
SHA512b7631f9685bac9f81aa6bf53afd839910773e108989bbb79ba39cafabbe6b6994ed2fde44911c9f7f24b45c9745d6e80cd9f01975bfb765561df4881f7dad696
-
Filesize
209KB
MD54bd5efec327da5b8bce11c124f769578
SHA18ff4aecd254ccc49da4ee06b5cb436cde49d4040
SHA256fc53a4c40629e477087ea01d0b2c8242ea69784737f4ed81eae3466a6b0757a9
SHA5121cdd73c8b4c990ce8a0fe2bde1f3e9c5d2e83ab8c3cab83c25cc63b149f6dafb0c85794168a3a19182f019364ebe7d6e0127ea54e0300a9cee37042821811f79