Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    146s
  • max time network
    118s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/12/2023, 16:56

General

  • Target

    06eba72841ac172379cd2d2c137ec5e8.exe

  • Size

    152KB

  • MD5

    06eba72841ac172379cd2d2c137ec5e8

  • SHA1

    027de096f10c982d7db4f26dc20375623f1f61c3

  • SHA256

    61d97c95c3bdc62dc5f4bcc43306576b709b526b93b71958e53f9d8fa06824f4

  • SHA512

    f9078b519571cfc7690c5ebd07f59f1ee9b750c4f2b0c1faa92c7b9916dc19a6f16a1ac59c28f78d9b01b2405564153d21d62e8738f0e576ae5b9b8447cbf4c6

  • SSDEEP

    3072:V5EG3HCzwrCaHHvhtbz0wXtV2eZDEUXni7fo7KSif8xWM33r3k1jTCZU4oQZiEgv:sGXCzwrCW/0AHa8nuo7KSif8xWM33r3Q

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\06eba72841ac172379cd2d2c137ec5e8.exe
    "C:\Users\Admin\AppData\Local\Temp\06eba72841ac172379cd2d2c137ec5e8.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4524
    • C:\Users\Admin\qoeun.exe
      "C:\Users\Admin\qoeun.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4544

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\qoeun.exe

    Filesize

    152KB

    MD5

    e08c89f4861f101e0802f3934ff320ef

    SHA1

    5c0aef8d1478abf3e16cd8ed1a809443d92af26f

    SHA256

    81503e015f9e74f74918e21ea1a9d66653277b88d5909b7645abc25ed80a1674

    SHA512

    a56910e0ec399864f8f3082366cf555385b877ffe714a034b60f327b050603adb10443ddfccdbd5ccebf524ac72282170c98829fd9eee7e74dad63048452a578