Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2023, 23:52
Behavioral task
behavioral1
Sample
07a08c629f834608f3867db38b39ab40.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
07a08c629f834608f3867db38b39ab40.exe
Resource
win10v2004-20231215-en
General
-
Target
07a08c629f834608f3867db38b39ab40.exe
-
Size
85KB
-
MD5
07a08c629f834608f3867db38b39ab40
-
SHA1
b0e272eeb5ef4b1e4622e308850ca0b14378b0f8
-
SHA256
6f7e397a1303196f6e6cd6d060b994bdef644bd0ca319bc8ca381e15bc563a20
-
SHA512
fb78e24df1087ea6e37c353140e4acd796cef82acb131f45def70a4ea99196d4880f0b6eab9ef49f87e817af2d897540400115df8ab96a90f5f53208222b4a0d
-
SSDEEP
1536:++/y8Y1fmebDyq4+F2SSXgxiIlA56D3P8aiOsWrWwKc8:++c1fmenyqpRiIl/rP8ad7WwKH
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Control Panel\International\Geo\Nation 07a08c629f834608f3867db38b39ab40.exe -
resource yara_rule behavioral2/memory/1484-0-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral2/memory/1484-2-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral2/memory/1484-3-0x0000000000400000-0x0000000000435000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1484 wrote to memory of 2212 1484 07a08c629f834608f3867db38b39ab40.exe 91 PID 1484 wrote to memory of 2212 1484 07a08c629f834608f3867db38b39ab40.exe 91 PID 1484 wrote to memory of 2212 1484 07a08c629f834608f3867db38b39ab40.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\07a08c629f834608f3867db38b39ab40.exe"C:\Users\Admin\AppData\Local\Temp\07a08c629f834608f3867db38b39ab40.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\B6AD.tmp.bat" > nul 2> nul2⤵PID:2212
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210B
MD5fa4df724828f33eeaf0922eab91bf811
SHA1192e880e7e599f8f9b63e44539e0b29dd94dd83a
SHA25637c9093c83bf338dfe7ff1a8c0e2a735d154f0c829069fc9d1196d8edfa646ae
SHA5123ff6f3d5fae140b691ffd5dcf9f8466db376fa231cdca215123dd6d4f827e2c73ac2f186f1d59d70c06bf350f2f9f58a7651ab4d16bf9235c889617a099fc7a9