Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
137s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 13:39
Static task
static1
Behavioral task
behavioral1
Sample
1a4d0807e2bfc6217e8ccdd1909111a2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1a4d0807e2bfc6217e8ccdd1909111a2.exe
Resource
win10v2004-20231215-en
General
-
Target
1a4d0807e2bfc6217e8ccdd1909111a2.exe
-
Size
248KB
-
MD5
1a4d0807e2bfc6217e8ccdd1909111a2
-
SHA1
eefc705d2ad689bd3aea4466cbcaebdb649d2f99
-
SHA256
96b32cf057284f68cfca119a9560954ee76f9a7f7634e545c15d9b3b70566bbb
-
SHA512
9845bcecdc54212da2c4db48b8cdeac23f433186d7809919c71db8c54edae5fbeb1ef1f50bfdde34ef41fe0eeea59ec7eb60bf46ad209a80aec4263ae9bcabcc
-
SSDEEP
6144:0HCyQXDsXB89crVEtKsv8sg+UrUDJAnnni8VPhNtj/t6pHt:0HCyQQRfrVET8sg+TDqnnnhNLtjViHt
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 1a4d0807e2bfc6217e8ccdd1909111a2.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 59 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4484 PING.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1836 wrote to memory of 3120 1836 1a4d0807e2bfc6217e8ccdd1909111a2.exe 97 PID 1836 wrote to memory of 3120 1836 1a4d0807e2bfc6217e8ccdd1909111a2.exe 97 PID 1836 wrote to memory of 3120 1836 1a4d0807e2bfc6217e8ccdd1909111a2.exe 97 PID 3120 wrote to memory of 4484 3120 cmd.exe 99 PID 3120 wrote to memory of 4484 3120 cmd.exe 99 PID 3120 wrote to memory of 4484 3120 cmd.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\1a4d0807e2bfc6217e8ccdd1909111a2.exe"C:\Users\Admin\AppData\Local\Temp\1a4d0807e2bfc6217e8ccdd1909111a2.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\1a4d0807e2bfc6217e8ccdd1909111a2.exe" >> NUL2⤵
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:4484
-
-