Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
203s -
max time network
219s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2023, 18:24
Behavioral task
behavioral1
Sample
0060b0cacb62958a36e8bb45dec0c460.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0060b0cacb62958a36e8bb45dec0c460.exe
Resource
win10v2004-20231215-en
General
-
Target
0060b0cacb62958a36e8bb45dec0c460.exe
-
Size
21KB
-
MD5
0060b0cacb62958a36e8bb45dec0c460
-
SHA1
a51e675caf10d21d34dbec50917bf3b6ebbae395
-
SHA256
88f586130d62597d214f6152b04b78beee271c3096b44d6c50ecdb5f29a9b65e
-
SHA512
b4a471f96c1537db96e555886d05812c91214133789409dc135e857ad26e3d9a7a3fec23f98f7cafa0538c87b2477c985010c7ede908a42586fbfa61cbc3497a
-
SSDEEP
384:xtmhqUNnSObO56sMzRgKUdctWIp1RYYUksezm73gFxyuM3wxi/:WhqUNSObOsPMEFSjbe5i/
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Control Panel\International\Geo\Nation 0060b0cacb62958a36e8bb45dec0c460.exe -
Executes dropped EXE 1 IoCs
pid Process 4932 sysxp.exe -
resource yara_rule behavioral2/memory/3820-0-0x0000000000400000-0x000000000040F502-memory.dmp upx behavioral2/files/0x000d00000001e6f2-5.dat upx behavioral2/memory/3820-9-0x0000000000400000-0x000000000040F502-memory.dmp upx behavioral2/memory/4932-11-0x0000000000400000-0x000000000040F502-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\key = "C:\\Windows\\system32\\sysxp.exe" 0060b0cacb62958a36e8bb45dec0c460.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\key = "C:\\Windows\\system32\\sysxp.exe" sysxp.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\sysxp.exe sysxp.exe File created C:\Windows\SysWOW64\sysxp.exe sysxp.exe File opened for modification C:\Windows\SysWOW64\sysxp.exe 0060b0cacb62958a36e8bb45dec0c460.exe File created C:\Windows\SysWOW64\sysxp.exe 0060b0cacb62958a36e8bb45dec0c460.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3820 0060b0cacb62958a36e8bb45dec0c460.exe Token: SeDebugPrivilege 4932 sysxp.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3820 wrote to memory of 4932 3820 0060b0cacb62958a36e8bb45dec0c460.exe 92 PID 3820 wrote to memory of 4932 3820 0060b0cacb62958a36e8bb45dec0c460.exe 92 PID 3820 wrote to memory of 4932 3820 0060b0cacb62958a36e8bb45dec0c460.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\0060b0cacb62958a36e8bb45dec0c460.exe"C:\Users\Admin\AppData\Local\Temp\0060b0cacb62958a36e8bb45dec0c460.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3820 -
C:\Windows\SysWOW64\sysxp.exe"C:\Windows\system32\sysxp.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:4932
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21KB
MD50060b0cacb62958a36e8bb45dec0c460
SHA1a51e675caf10d21d34dbec50917bf3b6ebbae395
SHA25688f586130d62597d214f6152b04b78beee271c3096b44d6c50ecdb5f29a9b65e
SHA512b4a471f96c1537db96e555886d05812c91214133789409dc135e857ad26e3d9a7a3fec23f98f7cafa0538c87b2477c985010c7ede908a42586fbfa61cbc3497a