Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
159s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 01:06
Static task
static1
Behavioral task
behavioral1
Sample
Fences5-sd-setup.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Fences5-sd-setup.exe
Resource
win10v2004-20231215-en
General
-
Target
Fences5-sd-setup.exe
-
Size
13.2MB
-
MD5
e87d579f1739ed05a18631e4e152414b
-
SHA1
412c77de6f3602d288c6381fe03821b41757829b
-
SHA256
e137e6bb3f096c35582647d7d2f43d28f1c890f5adf8d6edb4ebeb56be43ebec
-
SHA512
e3ef90052efc72f72b297646221399cccce85a6446fb8c0c5a568c3f49418d9cc05b07ab86612e4e66de85c7e5301ac9749fc86758853b36e030ceff0c69e6fb
-
SSDEEP
196608:6NaqQ8EuKAvWWqq1Q4mpMLjaceFLxbOZ92N6Ms5rE+vQrFvrfXvQdrIPF:6APmWWR1apUaceFL9Wm6o+UFvrfYqF
Malware Config
Signatures
-
resource yara_rule behavioral2/files/0x000200000001e7e8-5.dat upx behavioral2/memory/3656-12-0x0000000000730000-0x0000000000B18000-memory.dmp upx behavioral2/memory/3656-15-0x0000000000730000-0x0000000000B18000-memory.dmp upx behavioral2/memory/3656-16-0x0000000000730000-0x0000000000B18000-memory.dmp upx behavioral2/memory/3656-48-0x0000000000730000-0x0000000000B18000-memory.dmp upx behavioral2/memory/3656-71-0x0000000000730000-0x0000000000B18000-memory.dmp upx behavioral2/memory/3656-82-0x0000000000730000-0x0000000000B18000-memory.dmp upx behavioral2/memory/3656-88-0x0000000000730000-0x0000000000B18000-memory.dmp upx -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation Fences5-sd-setup.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation irsetup.exe -
Executes dropped EXE 2 IoCs
pid Process 3656 irsetup.exe 5072 GetMachineSID.exe -
Loads dropped DLL 2 IoCs
pid Process 3656 irsetup.exe 3656 irsetup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 3656 irsetup.exe 3656 irsetup.exe 3656 irsetup.exe 5072 GetMachineSID.exe 3656 irsetup.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 216 wrote to memory of 3656 216 Fences5-sd-setup.exe 96 PID 216 wrote to memory of 3656 216 Fences5-sd-setup.exe 96 PID 216 wrote to memory of 3656 216 Fences5-sd-setup.exe 96 PID 3656 wrote to memory of 4932 3656 irsetup.exe 100 PID 3656 wrote to memory of 4932 3656 irsetup.exe 100 PID 3656 wrote to memory of 4932 3656 irsetup.exe 100 PID 3656 wrote to memory of 5072 3656 irsetup.exe 102 PID 3656 wrote to memory of 5072 3656 irsetup.exe 102 PID 3656 wrote to memory of 5072 3656 irsetup.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\Fences5-sd-setup.exe"C:\Users\Admin\AppData\Local\Temp\Fences5-sd-setup.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe"C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe" __IRAOFF:1940002 "__IRAFN:C:\Users\Admin\AppData\Local\Temp\Fences5-sd-setup.exe" "__IRCT:3" "__IRTSS:0" "__IRSID:S-1-5-21-3073191680-435865314-2862784915-1000"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" export HKLM\Software\Stardock C:\Users\Admin\AppData\Local\Temp\registry_export.txt /y /reg:323⤵PID:4932
-
-
C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\GetMachineSID.exe"C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\GetMachineSID.exe" C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\GetMachineSID.tmp3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5072
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
406B
MD57cee57cbef71160b4acdfd692cf923d7
SHA1dcbaf7657eb5ba82f98457335fa3f54d5e094e79
SHA2563be0b7c42a33868a33c5e659102d1133b48708f31e9e73424ab9e2167a8df3ac
SHA512b9a9c889a9638669e7b8d08d9c504e2354338bfde301746dcc2006efb123fdded3897ee363b0a5931da0148e78013238898d890c13fc52e1064ee2f54b6633fb
-
Filesize
393KB
MD56eec47ab86d212fe3ed0f56985c8e817
SHA106da90bcc06c73ce2c7e112818af65f66fcae6c3
SHA256d0b2fa60e707982899ecd8c4dc462721c82491245b26721a7c0e840c5f557aed
SHA51236d6ef8a3fecb2c423079cadbfcbe2b044095f641c9a6ce0f9d0e96c6400f00a089aa26cc9d361bfdbcfdc3a8487d18d64956b36f39320648d1ddb565221a9cb
-
Filesize
58KB
MD555bbf335f75f2a2fe0a5daf603964d41
SHA1f1b9686e8a9f10682722fc5e08c02c016b597804
SHA256723adae0e69127a6bfbc65c5ef552a351264205ea5e2bc3b80e505feaa5d0e43
SHA512af49055234cb4a0ddbc68212db094c7a7a1058ccf6a1a5830238fe3ff96fa35390d242322436839d6d7e419bd9e4ad8962e213222470625cffb46423dec44db6
-
Filesize
40B
MD59d0ad71efda5f7ccd0c3a60fdb067036
SHA1917a0b2033edda83ccc4741202ed501bf7e56d64
SHA25695d8e37021cdd570d88b9c8a4bd548b3c35c580f387abd75260332f7cd8aacee
SHA5122f7cbb8c1baa931af76ae996828b9443767b54e1ed63557bacafa4b83431515d0ad4a355cd8a9bc1dbf6ba7b2816c9f0bb7861884ebf20080a467e61c9d09ed0
-
Filesize
1.3MB
MD568ac216f38a5f7c823712c216ca4b060
SHA1f6ad96e91103c40eb33fd3f1324d99093e5d014e
SHA256748d48d246526e2a79edcde87255ffa5387e3bcc94f6ca5e59589e07e683cd80
SHA5129b7dce4ed6e2caee1cdb33e490e7062344d95d27ba48e96f66094a3413da27fb32680dd2e9a5b2091489780929c27fe36914210793fbef81dfb5b4fb1a9b469b
-
Filesize
326KB
MD580d93d38badecdd2b134fe4699721223
SHA1e829e58091bae93bc64e0c6f9f0bac999cfda23d
SHA256c572a6103af1526f97e708a229a532fd02100a52b949f721052107f1f55e0c59
SHA5129f28073cc186b55ef64661c2e4f6fe1c112785a262b9d8e9a431703fdb1000f1d8cc0b2a3c153c822cfd48782ae945742ccb07beae4d6388d5d0b4df03103bd4