Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 17:07
Static task
static1
Behavioral task
behavioral1
Sample
7f0df1a55d049fbb332d5674db0e5e02.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7f0df1a55d049fbb332d5674db0e5e02.exe
Resource
win10v2004-20231215-en
General
-
Target
7f0df1a55d049fbb332d5674db0e5e02.exe
-
Size
50KB
-
MD5
7f0df1a55d049fbb332d5674db0e5e02
-
SHA1
025212b0196fdb181eca502a9c85c2773e324293
-
SHA256
60cbbbddfcf5652e01b7fa8805170a9e70d16b5b6494d4035aece8e123c223f4
-
SHA512
9aba9a7d53ec9c81356ee2c82928a6490d6b712ec2ddb7a63ce4f448c69478d7cd17a33bbb1ba037e673501f72a44367e07aa3b0bcd3b071f206f317e32dd3e8
-
SSDEEP
768:WayYtIjH4YacTnlXcvbsJZnXy7IYpiwaH1/FFCcDC2hdmX:NtIjYYzxJJy7IYHeRSG
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Control Panel\International\Geo\Nation 7f0df1a55d049fbb332d5674db0e5e02.exe -
Executes dropped EXE 1 IoCs
pid Process 2228 H.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2228 H.exe 2228 H.exe 2228 H.exe 2228 H.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1304 wrote to memory of 2228 1304 7f0df1a55d049fbb332d5674db0e5e02.exe 89 PID 1304 wrote to memory of 2228 1304 7f0df1a55d049fbb332d5674db0e5e02.exe 89 PID 1304 wrote to memory of 2228 1304 7f0df1a55d049fbb332d5674db0e5e02.exe 89 PID 2228 wrote to memory of 3400 2228 H.exe 45 PID 2228 wrote to memory of 3400 2228 H.exe 45 PID 2228 wrote to memory of 3400 2228 H.exe 45 PID 2228 wrote to memory of 3400 2228 H.exe 45
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3400
-
C:\Users\Admin\AppData\Local\Temp\7f0df1a55d049fbb332d5674db0e5e02.exe"C:\Users\Admin\AppData\Local\Temp\7f0df1a55d049fbb332d5674db0e5e02.exe"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Users\Admin\AppData\Local\Temp\H.exe"C:\Users\Admin\AppData\Local\Temp\H.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2228
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD574fde7b6d99af192d262b9f2cfec4c3f
SHA159076707dcf96ece0731d4b5df2ed92c1e57ddd2
SHA2569395c678469e835d34a7d68727e7f690f208a6bd204bdce187ef5483add38fd0
SHA51263aeed1c33cca239a9f9cdd76c823885f567f9bfe06c5bb59402c3306a5490371ca9097890524bf8d51d2b8ebedb469d0b82806eee421360770f71e2e73a81cb