Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 17:20
Static task
static1
Behavioral task
behavioral1
Sample
3076aab270e73b8e0a5eaf31ba1930f4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3076aab270e73b8e0a5eaf31ba1930f4.exe
Resource
win10v2004-20231215-en
General
-
Target
3076aab270e73b8e0a5eaf31ba1930f4.exe
-
Size
94KB
-
MD5
3076aab270e73b8e0a5eaf31ba1930f4
-
SHA1
575fb773bb5fdacf12e5a4a3cf9c986a0dccc821
-
SHA256
62fe5706c57b094da3b8247d136a039dc6f569a340d5cedffea4f565cce60db5
-
SHA512
8dcfd53d6e6645bbd114856d1f5f5a90f653e7387518d90107bee63735cf1947319cad91f86b160c75fba9079092081ef7c72950441a13434aa030ecdcbf22b0
-
SSDEEP
1536:Xfg+M2Y9oH+cpTKeyaI0Z/od8bDbRvU5yYeVYXrgITAGXBB3exYEjpepikFIy:XfgyY9oH+cTKGI0Z/oooeVYXrgI0GXW4
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation 3076aab270e73b8e0a5eaf31ba1930f4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3508 wrote to memory of 3152 3508 3076aab270e73b8e0a5eaf31ba1930f4.exe 94 PID 3508 wrote to memory of 3152 3508 3076aab270e73b8e0a5eaf31ba1930f4.exe 94 PID 3508 wrote to memory of 3152 3508 3076aab270e73b8e0a5eaf31ba1930f4.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\3076aab270e73b8e0a5eaf31ba1930f4.exe"C:\Users\Admin\AppData\Local\Temp\3076aab270e73b8e0a5eaf31ba1930f4.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Qhf..bat" > nul 2> nul2⤵PID:3152
-