Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    128s
  • max time network
    166s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2023, 17:19

General

  • Target

    305c90b471077791582eef89fe8022af.exe

  • Size

    64KB

  • MD5

    305c90b471077791582eef89fe8022af

  • SHA1

    e25ffd05d25150f96dd8f275c7d0d91dbaa242b8

  • SHA256

    cf306fca302ca0c2fa0323accfada0333af237a3d44db231412bb145a05c2af6

  • SHA512

    dc7dec9ad761a01aac9ad32143bda572f8a730e2cf2cab6e345fd3684bdf6a7935f96424a8a07930758d2c22920cd67d01345070041fd784f319cfc84cdee367

  • SSDEEP

    1536:IkHGcCYNndj7v08acy2UyPqTuifzPism8Ls5RY7sqBCdgS:IWvdjA83zUTFistj7sOCGS

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\305c90b471077791582eef89fe8022af.exe
    "C:\Users\Admin\AppData\Local\Temp\305c90b471077791582eef89fe8022af.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:628
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Fsj..bat" > nul 2> nul
      2⤵
        PID:3516

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Fsj..bat

      Filesize

      210B

      MD5

      68b00c9e6bd141127ffbaf41eaefc7fc

      SHA1

      9c7a019fb88477e1cb347fa7e116ce9d822dba8a

      SHA256

      62f52156e3e042f318b372acb182c4499f2a419ae9eee2dcfee280541698968c

      SHA512

      1e8e792eb7bb2b22872b9e8b2588a0776cdc50f3afa02687cc7c6d04453e318e11f91a6853e2009b5c87b3460b2281bf97637463d7f8b72b308e8dd16cec4418

    • memory/628-1-0x0000000002170000-0x0000000002196000-memory.dmp

      Filesize

      152KB

    • memory/628-2-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/628-3-0x0000000002280000-0x000000000229B000-memory.dmp

      Filesize

      108KB

    • memory/628-4-0x0000000002280000-0x000000000229B000-memory.dmp

      Filesize

      108KB

    • memory/628-6-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB