Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 23:30
Static task
static1
Behavioral task
behavioral1
Sample
2011a0a3177e513c58421226ff1261e4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2011a0a3177e513c58421226ff1261e4.exe
Resource
win10v2004-20231222-en
General
-
Target
2011a0a3177e513c58421226ff1261e4.exe
-
Size
412KB
-
MD5
2011a0a3177e513c58421226ff1261e4
-
SHA1
5b18e4dc05b80613c2da58769f2e8869fc0be15d
-
SHA256
15b3fec5c9b2d1711736bf968daac23d4562416a5e4d1aaf89f4a348192a7bbf
-
SHA512
6dd1d7bdc3d3d8f42a0c76161b6ad0ddf7853847fb99d36a7e7f226f113fd2ed52e939345e21855e570ee70f1b33885d0f54e3b72b27e326a228100564d3354e
-
SSDEEP
6144:akc9Ws12eA6BNkgEsDerjAOKAOJU2yIHP7y9T2Tbab5GMUuwwMoI:Bs21sDerjQP7yt2TuvGRoI
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 2011a0a3177e513c58421226ff1261e4.exe -
Loads dropped DLL 1 IoCs
pid Process 1116 2011a0a3177e513c58421226ff1261e4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1116 wrote to memory of 3964 1116 2011a0a3177e513c58421226ff1261e4.exe 22 PID 1116 wrote to memory of 3964 1116 2011a0a3177e513c58421226ff1261e4.exe 22 PID 1116 wrote to memory of 3964 1116 2011a0a3177e513c58421226ff1261e4.exe 22
Processes
-
C:\Users\Admin\AppData\Local\Temp\2011a0a3177e513c58421226ff1261e4.exe"C:\Users\Admin\AppData\Local\Temp\2011a0a3177e513c58421226ff1261e4.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" c:\670f946c-181d-4ed8-b9b0-946344b31b42\start.hta2⤵PID:3964
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
132KB
MD5b1e5e3a628512242c9bb809bd8164629
SHA19934a6c754079d010585a92a2b5ea3951234cd0a
SHA25641eef66c6d2813acef2511b19b5341a9e8177b2bdcf8538a9b28017a4cb072d6
SHA5120572f990d46cc0c753f8360d96dcb9596b97f5a4227922f8221a7b896dfe23a36274615dfbf39e2d00b3aa1b25fce46fdd5cea261a09ae94e671d5d53467e255