Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
129s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 10:45
Static task
static1
Behavioral task
behavioral1
Sample
1651795679aafd48a42c509b5085ee54.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1651795679aafd48a42c509b5085ee54.exe
Resource
win10v2004-20231215-en
General
-
Target
1651795679aafd48a42c509b5085ee54.exe
-
Size
132KB
-
MD5
1651795679aafd48a42c509b5085ee54
-
SHA1
5f9863876a67af2b1c665f699d1f9a007be19869
-
SHA256
a16abe881174be1dda03fbb5ecb793571ead0435e26145d61c43127e08325660
-
SHA512
3cd80519296517506269c3ef0378b4d47ad5ff98e2467ecb8bbe1807dd82581839490b1b47596c1be89b9ba1f23aa6410ed5a0bf30cf6190b49d6fa00e47119a
-
SSDEEP
3072:ZeBJrwCC2GlRMWiQF1H6ph0X1LE8/5Wu8OkljAoxLss0k:ZAJ832HQz6peX1//sHnxLssZ
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Control Panel\International\Geo\Nation 1651795679aafd48a42c509b5085ee54.exe -
Executes dropped EXE 1 IoCs
pid Process 3840 2.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\2.exe 1651795679aafd48a42c509b5085ee54.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4444 1651795679aafd48a42c509b5085ee54.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4444 wrote to memory of 3840 4444 1651795679aafd48a42c509b5085ee54.exe 92 PID 4444 wrote to memory of 3840 4444 1651795679aafd48a42c509b5085ee54.exe 92 PID 4444 wrote to memory of 3840 4444 1651795679aafd48a42c509b5085ee54.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\1651795679aafd48a42c509b5085ee54.exe"C:\Users\Admin\AppData\Local\Temp\1651795679aafd48a42c509b5085ee54.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Windows\2.exe"C:\Windows\2.exe"2⤵
- Executes dropped EXE
PID:3840
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
121KB
MD557277e3da164682f9cc88179db8ae413
SHA15ede8f490a547ac60ce5bd0fe0d0a585db7778c1
SHA2561788963b2942e0c33cc1366fe41420c255c7bc733bccfb0177c0c16ff351f91e
SHA51209fc1a65c3da7f69fe5d35287f28e93d147bc62c9455f38aa39bae9f33df61358ed73281df62c2a585f21a31f6f5f72cd52e2a6dd25c1182849c45e62e4e78fb