Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/12/2023, 22:29

General

  • Target

    05a132213c55150bd7eb19b12a9ec615.exe

  • Size

    1.0MB

  • MD5

    05a132213c55150bd7eb19b12a9ec615

  • SHA1

    77afc013c1d70ab190cb82bf473e00f9e6ea3bbe

  • SHA256

    72150744ee85074592c99946fd4577baee1795e74f5e1cc4afd03d9a9dd50ad8

  • SHA512

    b36a7833a0124df7b1601c834247a2a94e8f91916b4a452f3c67e07431d08b4b9398a7cce6dd96908dd707c0c29df5211b5b3391b1da60e1a14cb500a209c162

  • SSDEEP

    24576:j41+PU/2ueS8I+IGGyrOjPzLZ+9O1kWQmXKVTzLH:k+PU/2uNn+IGVcHRavmaVH

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\05a132213c55150bd7eb19b12a9ec615.exe
    "C:\Users\Admin\AppData\Local\Temp\05a132213c55150bd7eb19b12a9ec615.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1376
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2888
      • C:\Users\Admin\AppData\Local\Temp\temp.exe
        "C:\Users\Admin\AppData\Local\Temp\temp.exe"
        3⤵
        • Executes dropped EXE
        PID:4908
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4908 -ip 4908
    1⤵
      PID:5612
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4908 -s 264
      1⤵
      • Program crash
      PID:3752

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\temp.exe

      Filesize

      92KB

      MD5

      aa971a9ee4f0d153ebbced5de7447914

      SHA1

      4bc10b4128d2fd2223625dcc2d56b93fb0aa2732

      SHA256

      be1b6485244457c2c1f8e38175064f1bcbcf69ce45876f9999df731a40b157ae

      SHA512

      d52ecc92d7064c726484ca4d1e09bb9ffa678fddad7c925f447c2a71a02179f5b39bd31501f660f765238b3a366dec9bbfded3dc02c755e3080ef97e9fcac4db

    • memory/1376-12-0x00000000031E0000-0x00000000031E3000-memory.dmp

      Filesize

      12KB

    • memory/1376-25-0x0000000000D80000-0x0000000000D81000-memory.dmp

      Filesize

      4KB

    • memory/1376-33-0x0000000003210000-0x0000000003211000-memory.dmp

      Filesize

      4KB

    • memory/1376-2-0x0000000000700000-0x0000000000754000-memory.dmp

      Filesize

      336KB

    • memory/1376-32-0x00000000006B0000-0x00000000006B1000-memory.dmp

      Filesize

      4KB

    • memory/1376-49-0x0000000001000000-0x0000000001113000-memory.dmp

      Filesize

      1.1MB

    • memory/1376-50-0x0000000000700000-0x0000000000754000-memory.dmp

      Filesize

      336KB

    • memory/1376-4-0x0000000000760000-0x0000000000761000-memory.dmp

      Filesize

      4KB

    • memory/1376-1-0x0000000001000000-0x0000000001113000-memory.dmp

      Filesize

      1.1MB

    • memory/1376-5-0x0000000000CA0000-0x0000000000CA1000-memory.dmp

      Filesize

      4KB

    • memory/1376-31-0x0000000003280000-0x0000000003281000-memory.dmp

      Filesize

      4KB

    • memory/1376-30-0x0000000003200000-0x0000000003201000-memory.dmp

      Filesize

      4KB

    • memory/1376-29-0x0000000003220000-0x0000000003221000-memory.dmp

      Filesize

      4KB

    • memory/1376-28-0x00000000006A0000-0x00000000006A1000-memory.dmp

      Filesize

      4KB

    • memory/1376-27-0x0000000003270000-0x0000000003271000-memory.dmp

      Filesize

      4KB

    • memory/1376-26-0x0000000000DE0000-0x0000000000DE1000-memory.dmp

      Filesize

      4KB

    • memory/1376-22-0x0000000000DD0000-0x0000000000DD1000-memory.dmp

      Filesize

      4KB

    • memory/1376-24-0x0000000000D90000-0x0000000000D91000-memory.dmp

      Filesize

      4KB

    • memory/1376-3-0x0000000000780000-0x0000000000781000-memory.dmp

      Filesize

      4KB

    • memory/1376-23-0x0000000000DB0000-0x0000000000DB1000-memory.dmp

      Filesize

      4KB

    • memory/1376-18-0x0000000000D40000-0x0000000000D41000-memory.dmp

      Filesize

      4KB

    • memory/1376-20-0x0000000000D60000-0x0000000000D61000-memory.dmp

      Filesize

      4KB

    • memory/1376-19-0x0000000000D30000-0x0000000000D31000-memory.dmp

      Filesize

      4KB

    • memory/1376-21-0x0000000000CF0000-0x0000000000CF1000-memory.dmp

      Filesize

      4KB

    • memory/1376-17-0x0000000000CD0000-0x0000000000CD1000-memory.dmp

      Filesize

      4KB

    • memory/1376-16-0x0000000000CE0000-0x0000000000CE1000-memory.dmp

      Filesize

      4KB

    • memory/1376-15-0x0000000000D50000-0x0000000000D51000-memory.dmp

      Filesize

      4KB

    • memory/1376-14-0x0000000000D00000-0x0000000000D01000-memory.dmp

      Filesize

      4KB

    • memory/1376-13-0x0000000000D20000-0x0000000000D21000-memory.dmp

      Filesize

      4KB

    • memory/1376-0-0x0000000001000000-0x0000000001113000-memory.dmp

      Filesize

      1.1MB

    • memory/1376-11-0x0000000000CB0000-0x0000000000CB1000-memory.dmp

      Filesize

      4KB

    • memory/1376-10-0x00000000031F0000-0x00000000031F1000-memory.dmp

      Filesize

      4KB

    • memory/1376-9-0x00000000007A0000-0x00000000007A1000-memory.dmp

      Filesize

      4KB

    • memory/1376-8-0x00000000007B0000-0x00000000007B1000-memory.dmp

      Filesize

      4KB

    • memory/1376-7-0x00000000006C0000-0x00000000006C1000-memory.dmp

      Filesize

      4KB

    • memory/1376-6-0x00000000006E0000-0x00000000006E1000-memory.dmp

      Filesize

      4KB

    • memory/2888-48-0x0000000010000000-0x000000001006A000-memory.dmp

      Filesize

      424KB

    • memory/2888-39-0x00000000021E0000-0x00000000021E1000-memory.dmp

      Filesize

      4KB

    • memory/4908-51-0x0000000000400000-0x00000000004FA000-memory.dmp

      Filesize

      1000KB