Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2023, 21:24
Static task
static1
Behavioral task
behavioral1
Sample
0460055aa1d22db6f782ea7d193292f5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0460055aa1d22db6f782ea7d193292f5.exe
Resource
win10v2004-20231222-en
General
-
Target
0460055aa1d22db6f782ea7d193292f5.exe
-
Size
244KB
-
MD5
0460055aa1d22db6f782ea7d193292f5
-
SHA1
0ab97aefae9a123066b3cb75ccc2d1c46ab7c9a8
-
SHA256
3b75615babef6b23d7cda39f8f82610af508fc7166d2dc1af530c1b95dbf43da
-
SHA512
cc2369c0f6f1a2af6b033406ec5b74d06f8e69483df489d328d7132bc18c602abd395b264671f562b5d2ce76c8f5f096b3c61e244cf91fe1fc3890c58199008b
-
SSDEEP
6144:o68i3odBiTl2+TCU/jk8khuhuIp0huhuj:TNodBiTI+Tpjquauy
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft I Service = "C:\\Windows\\winhash_up.exe /REGstart" 0460055aa1d22db6f782ea7d193292f5.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\SHARE_TEMP\Icon3.ico 0460055aa1d22db6f782ea7d193292f5.exe File created C:\Windows\SHARE_TEMP\Icon6.ico 0460055aa1d22db6f782ea7d193292f5.exe File created C:\Windows\SHARE_TEMP\Icon7.ico 0460055aa1d22db6f782ea7d193292f5.exe File created C:\Windows\SHARE_TEMP\Icon12.ico 0460055aa1d22db6f782ea7d193292f5.exe File created C:\Windows\SHARE_TEMP\Icon14.ico 0460055aa1d22db6f782ea7d193292f5.exe File created C:\Windows\bugMAKER.bat 0460055aa1d22db6f782ea7d193292f5.exe File created C:\Windows\winhash_up.exez 0460055aa1d22db6f782ea7d193292f5.exe File opened for modification C:\Windows\winhash_up.exez 0460055aa1d22db6f782ea7d193292f5.exe File created C:\Windows\winhash_up.exe 0460055aa1d22db6f782ea7d193292f5.exe File created C:\Windows\SHARE_TEMP\Icon2.ico 0460055aa1d22db6f782ea7d193292f5.exe File created C:\Windows\SHARE_TEMP\Icon5.ico 0460055aa1d22db6f782ea7d193292f5.exe File created C:\Windows\SHARE_TEMP\Icon10.ico 0460055aa1d22db6f782ea7d193292f5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4520 cmd.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4836 wrote to memory of 4520 4836 0460055aa1d22db6f782ea7d193292f5.exe 87 PID 4836 wrote to memory of 4520 4836 0460055aa1d22db6f782ea7d193292f5.exe 87 PID 4836 wrote to memory of 4520 4836 0460055aa1d22db6f782ea7d193292f5.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\0460055aa1d22db6f782ea7d193292f5.exe"C:\Users\Admin\AppData\Local\Temp\0460055aa1d22db6f782ea7d193292f5.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\bugMAKER.bat2⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
PID:4520
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76B
MD5c679d65df302c6d54770907ab147c953
SHA1db6e4bff3122fb1b1c5ed4204cccaf613082e8fa
SHA256fc43f3cffa6c8f87d39c58169e4fff83de0a89346c68a005f2f17670a60aabfd
SHA512fae207df4385369fe807bebb70db58b47994868b9d528a00321f186447216f0ceb554ef75b2222d315e71a9fd9caca8e9777e47b0cdee03d0b08e492de907b00