Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    168s
  • max time network
    170s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/12/2023, 06:57

General

  • Target

    119749d597548e920588cb8cbe72ff2e.exe

  • Size

    1.3MB

  • MD5

    119749d597548e920588cb8cbe72ff2e

  • SHA1

    0e85ceb4ec72720deca37803d873ccdacef9af9f

  • SHA256

    1ea1028025522a23f44fd7420403f488621eeaf8f4bb5b6b47f8bc7b213f06a6

  • SHA512

    20e579cef074438fd130bb8ceea3b6ab09ba5c9c49a675b64ec0ffd843ab6a3b2b2345a9b77805650352260e9c748f4de7e3f6abb373cc9377821e5ba4231e27

  • SSDEEP

    24576:y6rT9SSZ7+w8gLDw0PxEUB8Yoyl2G5eTJMvyTaNAUnAyFmn8Wse:yC9Sy7+3gY0PxEUBroyl2DrTaNhOFse

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 28 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies Internet Explorer start page 1 TTPs 1 IoCs
  • Suspicious behavior: LoadsDriver 22 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\119749d597548e920588cb8cbe72ff2e.exe
    "C:\Users\Admin\AppData\Local\Temp\119749d597548e920588cb8cbe72ff2e.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:4612
    • C:\Program Files\5678soft\nbclient\JKNBMS.exe
      "C:\Program Files\5678soft\nbclient\JKNBMS.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in Program Files directory
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      PID:3932

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\5678soft\nbclient\JKNBMS.exe

    Filesize

    71KB

    MD5

    4723274209607b3e0b12e72f077f0682

    SHA1

    d131ab38d01dbf80694fc3470ef6ae066ef1265c

    SHA256

    0ec3c3fe05fbfa1b034501147da2b12b9149198cb1c9b84e52ed7cd7fc4c53a7

    SHA512

    b5e486fbb4ba019ad5bd5256de133bffaa588425caa1e7d81afbd60ad408ab0b6fd1e6311843e446727ef042d8212e5a5d78aecedd194ce3e36c93107fd83289

  • C:\Program Files\5678soft\nbclient\JKNBMS.exe

    Filesize

    92KB

    MD5

    b69328f54ad92ce23c319708ec8fbea7

    SHA1

    ac931b996ddc3b7ed2143ac1f313a54b556d4c35

    SHA256

    d973061bbca7d1137f34320093d4c0990968821e7bc41829c79a3121770e3930

    SHA512

    108960927b6f4931615d5565a35939f1ff5db4628bb32ad3072270c9402a2f66180c245a533036d8879333e0ce6b33e1e584e1d0c1657fb147c54fee57ef4f89

  • C:\Program Files\5678soft\nbclient\SOAPWEBSERVICE.DLL

    Filesize

    20KB

    MD5

    c2092f4d0d16d9a7726037354168f660

    SHA1

    9a3f5a87b63e61c21f16e61e8974e6dd1cb34e39

    SHA256

    8fcc7937fafb9e2eb393f1e1a385f97569e94800bfda7b09199fa5aced9ec132

    SHA512

    6ed0defbfa9fae7e918c19657c35569e7371e73e99495f78ecf993468a872376648059577be28712b2703b9850e69fc020c091052f0ae53c4c0ddbddbd34655e

  • memory/3932-36-0x00000000005F0000-0x0000000000605000-memory.dmp

    Filesize

    84KB

  • memory/3932-37-0x0000000002460000-0x0000000002461000-memory.dmp

    Filesize

    4KB

  • memory/3932-43-0x0000000000400000-0x00000000005EE000-memory.dmp

    Filesize

    1.9MB

  • memory/3932-44-0x00000000005F0000-0x0000000000605000-memory.dmp

    Filesize

    84KB

  • memory/3932-47-0x0000000002460000-0x0000000002461000-memory.dmp

    Filesize

    4KB

  • memory/3932-49-0x00000000005F0000-0x0000000000605000-memory.dmp

    Filesize

    84KB

  • memory/3932-71-0x00000000005F0000-0x0000000000605000-memory.dmp

    Filesize

    84KB

  • memory/4612-34-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/4612-22-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB