Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
109s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 11:50
Static task
static1
Behavioral task
behavioral1
Sample
6c2df450b1804ff8b945968c8dadefd8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6c2df450b1804ff8b945968c8dadefd8.exe
Resource
win10v2004-20231215-en
General
-
Target
6c2df450b1804ff8b945968c8dadefd8.exe
-
Size
93KB
-
MD5
6c2df450b1804ff8b945968c8dadefd8
-
SHA1
eea7823b643a0cd416747b718d2d0717bc291a1c
-
SHA256
5c51746a8b6ba5b3ff2999027e1c9d1d5232136603f59d536e9db28ded054ea2
-
SHA512
017c468e44e03cc83d4f3fec6efc68395427e312ead298f8eeb03c2da463ecad55eb017da7367c7cfda1a16969cf23671e930c62792e78f898623445f4b2329e
-
SSDEEP
1536:VyQT05QG70AQz6CwvonnZfr0od8yQoAX2D357dGweFrBNo8DirUrlFIy:/ZD0o3A2lZirztrlFIy
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation 6c2df450b1804ff8b945968c8dadefd8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4672 wrote to memory of 1088 4672 6c2df450b1804ff8b945968c8dadefd8.exe 98 PID 4672 wrote to memory of 1088 4672 6c2df450b1804ff8b945968c8dadefd8.exe 98 PID 4672 wrote to memory of 1088 4672 6c2df450b1804ff8b945968c8dadefd8.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\6c2df450b1804ff8b945968c8dadefd8.exe"C:\Users\Admin\AppData\Local\Temp\6c2df450b1804ff8b945968c8dadefd8.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Ugf..bat" > nul 2> nul2⤵PID:1088
-