Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
168s -
max time network
181s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 21:05
Static task
static1
Behavioral task
behavioral1
Sample
1c73c0610b75db41d84b5df907ee70e1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1c73c0610b75db41d84b5df907ee70e1.exe
Resource
win10v2004-20231215-en
General
-
Target
1c73c0610b75db41d84b5df907ee70e1.exe
-
Size
28KB
-
MD5
1c73c0610b75db41d84b5df907ee70e1
-
SHA1
1cf600e55359d88e206e0356fb8eed6c75f0646c
-
SHA256
e6a41b5c877157931773ce7d580ba6718b95f08d0b7cc7ed4739bb42ed0699c4
-
SHA512
06e6ed29ad1ff562de876c002ebd9fff766f249efadbfe0c4b09497a1fbe815d2aad9f5e623c6021b1b16038b8afd01a7d802f4d3d8d0013cafaa8b472f419fe
-
SSDEEP
192:M4gaCMuq9OgoLszgnJaG9MMzmOByhcWirEZMDJ0njgbucGL8F:Mquq9xoug93S5hHirEZcJk6ucG
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 1c73c0610b75db41d84b5df907ee70e1.exe -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lsass.exe 1c73c0610b75db41d84b5df907ee70e1.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lsass.exe 1c73c0610b75db41d84b5df907ee70e1.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lsass.exe lsass.exe -
Executes dropped EXE 1 IoCs
pid Process 2128 lsass.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2216 wrote to memory of 2128 2216 1c73c0610b75db41d84b5df907ee70e1.exe 96 PID 2216 wrote to memory of 2128 2216 1c73c0610b75db41d84b5df907ee70e1.exe 96 PID 2216 wrote to memory of 2128 2216 1c73c0610b75db41d84b5df907ee70e1.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\1c73c0610b75db41d84b5df907ee70e1.exe"C:\Users\Admin\AppData\Local\Temp\1c73c0610b75db41d84b5df907ee70e1.exe"1⤵
- Checks computer location settings
- Drops startup file
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lsass.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lsass.exe"2⤵
- Drops startup file
- Executes dropped EXE
PID:2128
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD51c73c0610b75db41d84b5df907ee70e1
SHA11cf600e55359d88e206e0356fb8eed6c75f0646c
SHA256e6a41b5c877157931773ce7d580ba6718b95f08d0b7cc7ed4739bb42ed0699c4
SHA51206e6ed29ad1ff562de876c002ebd9fff766f249efadbfe0c4b09497a1fbe815d2aad9f5e623c6021b1b16038b8afd01a7d802f4d3d8d0013cafaa8b472f419fe