Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/12/2023, 22:13

General

  • Target

    fbfe023690079d21774f2d364656c21b.exe

  • Size

    93KB

  • MD5

    fbfe023690079d21774f2d364656c21b

  • SHA1

    f6cd295f6bb1816785da17cb79f6b5ea562621f5

  • SHA256

    5096b13f69ed37de3b9e1136baf15ac18ff38ab9f5d03abf001f2c9c6eb1316f

  • SHA512

    76f4fd6df7425bdc00f9717306489224ef11a445432f344768b25381b5b0cb6a65866ab1d87b0f66ae28c2ff12cbb3ae9f1dd11829746a2553ebb4778a8ac5ba

  • SSDEEP

    1536:FyQT05QG70AQz6CwvonnZfr0od8yQoAX2D357dGweFrBNo8DirUrlFIy:vZD0o3A2lZirztrlFIy

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fbfe023690079d21774f2d364656c21b.exe
    "C:\Users\Admin\AppData\Local\Temp\fbfe023690079d21774f2d364656c21b.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1632
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Ukz..bat" > nul 2> nul
      2⤵
        PID:4768

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Ukz..bat

      Filesize

      210B

      MD5

      335d31d5a186f0747e179f33681a2bde

      SHA1

      65f4d94224ac7dee0f2cc5ae846e3475982de6f3

      SHA256

      f80c9f6f15867d180fcfae14fd4e9309ca99abc3dc0a0e6cfd9ffb85dbb7ffea

      SHA512

      eb01337fef3ebb0191fa7ef29c0dadaee3ab5b2b5baf93a83764c38bf608932ee15ca7a0522914b7a49984181499897ab2f9a7dd3c886f368e0e5c9ae41a7794

    • memory/1632-0-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/1632-1-0x00000000005E0000-0x00000000005E1000-memory.dmp

      Filesize

      4KB

    • memory/1632-2-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/1632-3-0x00000000021E0000-0x00000000021E1000-memory.dmp

      Filesize

      4KB

    • memory/1632-5-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB