Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 16:21
Static task
static1
Behavioral task
behavioral1
Sample
7c53e621328c4bb3c58cd96dd8635ef5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7c53e621328c4bb3c58cd96dd8635ef5.exe
Resource
win10v2004-20231215-en
General
-
Target
7c53e621328c4bb3c58cd96dd8635ef5.exe
-
Size
50KB
-
MD5
7c53e621328c4bb3c58cd96dd8635ef5
-
SHA1
689f181e4eb425ce1e5efa1517c1785e049806c9
-
SHA256
dd24ca74cc9e398392d9a8502ba8da174a7a5aa66fddc657017b60c91e879fd7
-
SHA512
b0743daaecc9487cf40332bd7cc6839d3284a0a1a77f50b983fe8849ace051128e59b0d1bc3a31390822949ab9379e44aeb8aadd28b491e3de08bd51e3e7298d
-
SSDEEP
768:tIyYtIjH4YacTnlXcvbsJZnXy7IYpiwaH1/FFCcDC2hdmX:QtIjYYzxJJy7IYHeRSG
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation 7c53e621328c4bb3c58cd96dd8635ef5.exe -
Executes dropped EXE 1 IoCs
pid Process 2136 H.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2136 H.exe 2136 H.exe 2136 H.exe 2136 H.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2256 wrote to memory of 2136 2256 7c53e621328c4bb3c58cd96dd8635ef5.exe 89 PID 2256 wrote to memory of 2136 2256 7c53e621328c4bb3c58cd96dd8635ef5.exe 89 PID 2256 wrote to memory of 2136 2256 7c53e621328c4bb3c58cd96dd8635ef5.exe 89 PID 2136 wrote to memory of 3524 2136 H.exe 27 PID 2136 wrote to memory of 3524 2136 H.exe 27 PID 2136 wrote to memory of 3524 2136 H.exe 27 PID 2136 wrote to memory of 3524 2136 H.exe 27
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3524
-
C:\Users\Admin\AppData\Local\Temp\7c53e621328c4bb3c58cd96dd8635ef5.exe"C:\Users\Admin\AppData\Local\Temp\7c53e621328c4bb3c58cd96dd8635ef5.exe"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\H.exe"C:\Users\Admin\AppData\Local\Temp\H.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2136
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD574fde7b6d99af192d262b9f2cfec4c3f
SHA159076707dcf96ece0731d4b5df2ed92c1e57ddd2
SHA2569395c678469e835d34a7d68727e7f690f208a6bd204bdce187ef5483add38fd0
SHA51263aeed1c33cca239a9f9cdd76c823885f567f9bfe06c5bb59402c3306a5490371ca9097890524bf8d51d2b8ebedb469d0b82806eee421360770f71e2e73a81cb