Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 03:47
Static task
static1
Behavioral task
behavioral1
Sample
5197fea6dd68898e6eb71dbd514bd944.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5197fea6dd68898e6eb71dbd514bd944.exe
Resource
win10v2004-20231215-en
General
-
Target
5197fea6dd68898e6eb71dbd514bd944.exe
-
Size
25KB
-
MD5
5197fea6dd68898e6eb71dbd514bd944
-
SHA1
442031bdf156a69468e87b33cf79851408868d23
-
SHA256
eb0e55768697855cf00a2c66e3dbae4b5dbffe5d0fc90a26f93648e68ccb28b5
-
SHA512
a885adf7fd05bb9a20b892df35c2110427776e4e51c882279101772b3cfbb510d5b599bd99ae11dea6331367b9411332f79d22d87de969085848f2059dbde7ae
-
SSDEEP
384:x/0rrQwc35G9rGWTTw33yqP5i2F5WvVFZksAi2q8:Src9sGKcHlNCz2q
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Control Panel\International\Geo\Nation 5197fea6dd68898e6eb71dbd514bd944.exe -
Executes dropped EXE 1 IoCs
pid Process 4132 irun4.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\irun4.exe 5197fea6dd68898e6eb71dbd514bd944.exe File opened for modification C:\Windows\SysWOW64\irun4.exe 5197fea6dd68898e6eb71dbd514bd944.exe File created C:\Windows\SysWOW64\irun4.exe irun4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4520 5197fea6dd68898e6eb71dbd514bd944.exe 4132 irun4.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4520 wrote to memory of 4132 4520 5197fea6dd68898e6eb71dbd514bd944.exe 89 PID 4520 wrote to memory of 4132 4520 5197fea6dd68898e6eb71dbd514bd944.exe 89 PID 4520 wrote to memory of 4132 4520 5197fea6dd68898e6eb71dbd514bd944.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\5197fea6dd68898e6eb71dbd514bd944.exe"C:\Users\Admin\AppData\Local\Temp\5197fea6dd68898e6eb71dbd514bd944.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Windows\SysWOW64\irun4.exe"C:\Windows\system32\irun4.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of FindShellTrayWindow
PID:4132
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
25KB
MD55197fea6dd68898e6eb71dbd514bd944
SHA1442031bdf156a69468e87b33cf79851408868d23
SHA256eb0e55768697855cf00a2c66e3dbae4b5dbffe5d0fc90a26f93648e68ccb28b5
SHA512a885adf7fd05bb9a20b892df35c2110427776e4e51c882279101772b3cfbb510d5b599bd99ae11dea6331367b9411332f79d22d87de969085848f2059dbde7ae