Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
29s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 01:47
Static task
static1
Behavioral task
behavioral1
Sample
234bf13ed07d0a10a651a1c37c0a367f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
234bf13ed07d0a10a651a1c37c0a367f.exe
Resource
win10v2004-20231215-en
General
-
Target
234bf13ed07d0a10a651a1c37c0a367f.exe
-
Size
430KB
-
MD5
234bf13ed07d0a10a651a1c37c0a367f
-
SHA1
350a64e34ece1da83a360bf3f0d91497478c0d97
-
SHA256
78b501509d17af404f51089714d6b064d2e0cee0b2904a190ce3a6db359aceab
-
SHA512
5009fbd2d4e17eb276ea5c35d6793d9e5b603e4cbecd48c83947c95e3a53289d26aab0b4e6647be9e4b145baf4e75ce6aa6af5773bce731a767e3edb1df8f591
-
SSDEEP
12288:ibee0PGl89WazvzkmMxM+ltxQMAn0Iv1b70ZSf2/:2edGBazvZMHltxtIv1bUS+/
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 234bf13ed07d0a10a651a1c37c0a367f.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Winder.lnk 234bf13ed07d0a10a651a1c37c0a367f.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\234bf13ed07d0a10a651a1c37c0a367f.exe = "C:\\System32\\234bf13ed07d0a10a651a1c37c0a367f.exe" 234bf13ed07d0a10a651a1c37c0a367f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000_Classes\Local Settings 234bf13ed07d0a10a651a1c37c0a367f.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2680 234bf13ed07d0a10a651a1c37c0a367f.exe 2680 234bf13ed07d0a10a651a1c37c0a367f.exe 2680 234bf13ed07d0a10a651a1c37c0a367f.exe 2680 234bf13ed07d0a10a651a1c37c0a367f.exe 2680 234bf13ed07d0a10a651a1c37c0a367f.exe 2680 234bf13ed07d0a10a651a1c37c0a367f.exe 2680 234bf13ed07d0a10a651a1c37c0a367f.exe 2680 234bf13ed07d0a10a651a1c37c0a367f.exe 2680 234bf13ed07d0a10a651a1c37c0a367f.exe 2680 234bf13ed07d0a10a651a1c37c0a367f.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2680 234bf13ed07d0a10a651a1c37c0a367f.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2680 234bf13ed07d0a10a651a1c37c0a367f.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2680 234bf13ed07d0a10a651a1c37c0a367f.exe 2680 234bf13ed07d0a10a651a1c37c0a367f.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2680 wrote to memory of 4908 2680 234bf13ed07d0a10a651a1c37c0a367f.exe 92 PID 2680 wrote to memory of 4908 2680 234bf13ed07d0a10a651a1c37c0a367f.exe 92 PID 2680 wrote to memory of 4908 2680 234bf13ed07d0a10a651a1c37c0a367f.exe 92 PID 2680 wrote to memory of 3868 2680 234bf13ed07d0a10a651a1c37c0a367f.exe 93 PID 2680 wrote to memory of 3868 2680 234bf13ed07d0a10a651a1c37c0a367f.exe 93 PID 2680 wrote to memory of 3868 2680 234bf13ed07d0a10a651a1c37c0a367f.exe 93 PID 2680 wrote to memory of 2888 2680 234bf13ed07d0a10a651a1c37c0a367f.exe 96 PID 2680 wrote to memory of 2888 2680 234bf13ed07d0a10a651a1c37c0a367f.exe 96 PID 2680 wrote to memory of 2888 2680 234bf13ed07d0a10a651a1c37c0a367f.exe 96 PID 2680 wrote to memory of 2788 2680 234bf13ed07d0a10a651a1c37c0a367f.exe 94 PID 2680 wrote to memory of 2788 2680 234bf13ed07d0a10a651a1c37c0a367f.exe 94 PID 2680 wrote to memory of 2788 2680 234bf13ed07d0a10a651a1c37c0a367f.exe 94 PID 2680 wrote to memory of 3704 2680 234bf13ed07d0a10a651a1c37c0a367f.exe 95 PID 2680 wrote to memory of 3704 2680 234bf13ed07d0a10a651a1c37c0a367f.exe 95 PID 2680 wrote to memory of 3704 2680 234bf13ed07d0a10a651a1c37c0a367f.exe 95 PID 2680 wrote to memory of 4008 2680 234bf13ed07d0a10a651a1c37c0a367f.exe 97 PID 2680 wrote to memory of 4008 2680 234bf13ed07d0a10a651a1c37c0a367f.exe 97 PID 2680 wrote to memory of 4008 2680 234bf13ed07d0a10a651a1c37c0a367f.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\234bf13ed07d0a10a651a1c37c0a367f.exe"C:\Users\Admin\AppData\Local\Temp\234bf13ed07d0a10a651a1c37c0a367f.exe"1⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS1.vbs"2⤵PID:4908
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS1.vbs"2⤵PID:3868
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS1.vbs"2⤵PID:2788
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS1.vbs"2⤵PID:3704
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS1.vbs"2⤵PID:2888
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS1.vbs"2⤵PID:4008
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
653B
MD56a8d17e84294466a95c85c114f0ab3e3
SHA1e8a3b15f2b25c0b8b47cc06686e99fe43e67b728
SHA25651e394223c13ed3a480608d380043f91e5df94e53049c8b993e595caf16d6181
SHA5127ca86c5ac9f50ac834b174c465f861b5152f3a93544df48607db09dae67b2d977be649d1b8e307b34bd96c0e3de97efecff64003485d16e73f8cca2b2fb212ba