Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 06:38
Static task
static1
Behavioral task
behavioral1
Sample
1139c28812b60a1dc815230907f306cb.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1139c28812b60a1dc815230907f306cb.exe
Resource
win10v2004-20231215-en
General
-
Target
1139c28812b60a1dc815230907f306cb.exe
-
Size
121KB
-
MD5
1139c28812b60a1dc815230907f306cb
-
SHA1
56235cf77dac6cc23425cb42cfcf804656640fb3
-
SHA256
11b837b89e9bb722b91e287df3a83e874fe7938228f73c0d314da6701d0e1c45
-
SHA512
c82f598bcb453bfabebeb5d857743c4aff80840836bbf0eb3a71b1266a44fb383601a7091fc7ef19f7b4a26d91f3f51fed27fdd19a23e03988ab9bc81bd324e6
-
SSDEEP
1536:iUK3ATn6Q1w6ZnBbWxu5hb86HTU879i0PORJrqpzuQfRH+:SwTJPl9Wxuw6HTqR4pR
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Control Panel\International\Geo\Nation 1139c28812b60a1dc815230907f306cb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2252 wrote to memory of 3552 2252 1139c28812b60a1dc815230907f306cb.exe 93 PID 2252 wrote to memory of 3552 2252 1139c28812b60a1dc815230907f306cb.exe 93 PID 2252 wrote to memory of 3552 2252 1139c28812b60a1dc815230907f306cb.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\1139c28812b60a1dc815230907f306cb.exe"C:\Users\Admin\AppData\Local\Temp\1139c28812b60a1dc815230907f306cb.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Xsj..bat" > nul 2> nul2⤵PID:3552
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210B
MD5138759efe5120f1ca395b97598871320
SHA131e5bd417a9599189c9f02bfebc12dcbb96ac8aa
SHA256598f15056fa52effc435f07be676848b74ea58efd2898df9376a59c0a7e6029c
SHA512cf263074e64af006d038721947ff0fe2c2f44aac77839732a8d64b74a407ad599804a22f31c5f1b9d55681f0366eee07c54907f6e76e29a0accb4c70630e4f96