Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
28/12/2023, 22:13
Static task
static1
Behavioral task
behavioral1
Sample
fbfe023690079d21774f2d364656c21b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
fbfe023690079d21774f2d364656c21b.exe
Resource
win10v2004-20231215-en
General
-
Target
fbfe023690079d21774f2d364656c21b.exe
-
Size
93KB
-
MD5
fbfe023690079d21774f2d364656c21b
-
SHA1
f6cd295f6bb1816785da17cb79f6b5ea562621f5
-
SHA256
5096b13f69ed37de3b9e1136baf15ac18ff38ab9f5d03abf001f2c9c6eb1316f
-
SHA512
76f4fd6df7425bdc00f9717306489224ef11a445432f344768b25381b5b0cb6a65866ab1d87b0f66ae28c2ff12cbb3ae9f1dd11829746a2553ebb4778a8ac5ba
-
SSDEEP
1536:FyQT05QG70AQz6CwvonnZfr0od8yQoAX2D357dGweFrBNo8DirUrlFIy:vZD0o3A2lZirztrlFIy
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Control Panel\International\Geo\Nation fbfe023690079d21774f2d364656c21b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1632 wrote to memory of 4768 1632 fbfe023690079d21774f2d364656c21b.exe 94 PID 1632 wrote to memory of 4768 1632 fbfe023690079d21774f2d364656c21b.exe 94 PID 1632 wrote to memory of 4768 1632 fbfe023690079d21774f2d364656c21b.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\fbfe023690079d21774f2d364656c21b.exe"C:\Users\Admin\AppData\Local\Temp\fbfe023690079d21774f2d364656c21b.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Ukz..bat" > nul 2> nul2⤵PID:4768
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210B
MD5335d31d5a186f0747e179f33681a2bde
SHA165f4d94224ac7dee0f2cc5ae846e3475982de6f3
SHA256f80c9f6f15867d180fcfae14fd4e9309ca99abc3dc0a0e6cfd9ffb85dbb7ffea
SHA512eb01337fef3ebb0191fa7ef29c0dadaee3ab5b2b5baf93a83764c38bf608932ee15ca7a0522914b7a49984181499897ab2f9a7dd3c886f368e0e5c9ae41a7794