Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 08:12
Static task
static1
Behavioral task
behavioral1
Sample
13176cea7b40e46fa45932494886b5f6.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
13176cea7b40e46fa45932494886b5f6.exe
Resource
win10v2004-20231215-en
General
-
Target
13176cea7b40e46fa45932494886b5f6.exe
-
Size
112KB
-
MD5
13176cea7b40e46fa45932494886b5f6
-
SHA1
6295ce4a287e110d34eda671413142bc45cfcdb6
-
SHA256
5fc47f28ce7cbcb8d143d40ca16ce66cf1c2485e6952210577b65089b15b83f3
-
SHA512
6056ba0696a6535c0d40902299033ef57755dd917a7a9d0d42a398ac5d4f9ff19aea8730834d91fec134e9ba4c2a8572bcecc83d5723286e67a18164d4d19441
-
SSDEEP
3072:/19Cc3nckFtUJE4SRoept7Em2F8abPeROXbfZnW2lW9:/1tnckFeSvAFuJROVnWyW9
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Control Panel\International\Geo\Nation 13176cea7b40e46fa45932494886b5f6.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\c_7382.nls 13176cea7b40e46fa45932494886b5f6.exe File opened for modification C:\Windows\SysWOW64\c_7382.nls 13176cea7b40e46fa45932494886b5f6.exe File created C:\Windows\SysWOW64\dllcache\ups.exe 13176cea7b40e46fa45932494886b5f6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 6068 13176cea7b40e46fa45932494886b5f6.exe Token: SeRestorePrivilege 6068 13176cea7b40e46fa45932494886b5f6.exe Token: SeIncBasePriorityPrivilege 6068 13176cea7b40e46fa45932494886b5f6.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 6068 wrote to memory of 4860 6068 13176cea7b40e46fa45932494886b5f6.exe 33 PID 6068 wrote to memory of 4860 6068 13176cea7b40e46fa45932494886b5f6.exe 33 PID 6068 wrote to memory of 4860 6068 13176cea7b40e46fa45932494886b5f6.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\13176cea7b40e46fa45932494886b5f6.exe"C:\Users\Admin\AppData\Local\Temp\13176cea7b40e46fa45932494886b5f6.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:6068 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\13176C~1.EXE2⤵PID:4860
-