Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    69s
  • max time network
    92s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/12/2023, 14:20

General

  • Target

    7529babe2d26fe59fdad435594befd91.exe

  • Size

    48KB

  • MD5

    7529babe2d26fe59fdad435594befd91

  • SHA1

    c1c5e1b70ba94ee4a8e7f365c80dfd8abe297250

  • SHA256

    4ffb4c60ef8649fdb11e0ed86fab9df6e6b34ea1e86417aca1eb9e5ae7f61464

  • SHA512

    fab659ca1a11182434d60c2a2b4b98002312a05bae1b1bf4290b69c771cfddc23f259489ce19bbd047795918606bb2d0afaa67ffa613b2ee86669be4713e623c

  • SSDEEP

    768:26NEhmqg90TiUv+6wH9H7MfygXaDMFQXD7e:26amLDC6NNDsQXD7

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7529babe2d26fe59fdad435594befd91.exe
    "C:\Users\Admin\AppData\Local\Temp\7529babe2d26fe59fdad435594befd91.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4488
    • C:\Users\Admin\xoausud.exe
      "C:\Users\Admin\xoausud.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4196

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\xoausud.exe

    Filesize

    48KB

    MD5

    c0b2f7d74f7ace568efc652c59959445

    SHA1

    6114e69f0b2da08ad0cf1e5bd93166885816acd8

    SHA256

    aa765366dbf7ed1435c91eb0b24c8dc82eea8825a768adaa696ba56df9e13c27

    SHA512

    32be4502a698df4ba52baeaadeb9d674f3516be08e19af9c0483021c879c00853f6cae623f21cd3bfe3c0a1eb641103e9ab48bc66c7be0bb7d0a0360c82745a4