Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
159s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 02:30
Static task
static1
Behavioral task
behavioral1
Sample
248980536e8aaddc4f5cd23e285d5b9a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
248980536e8aaddc4f5cd23e285d5b9a.exe
Resource
win10v2004-20231215-en
General
-
Target
248980536e8aaddc4f5cd23e285d5b9a.exe
-
Size
365KB
-
MD5
248980536e8aaddc4f5cd23e285d5b9a
-
SHA1
ec027dfb1e5ec87dd4f9f8069fbf932229034051
-
SHA256
a4266e47fd1b17b91b44a4a2f258ec1e292f2d16315ff8020c1242f2c14b0688
-
SHA512
4befdf49ce2f54d086dc158e67906d157fd97934d8277b5d633d3e2db788647ee73edc620c1f92ca7d59f054ec936dbb3af734b6973eeda311cd8041610cdc1d
-
SSDEEP
6144:yPs5yw65yeVG/nYYcptk30fgZpKj6OxcQp7pQR1O:NghHVwYZ2QmO1W1O
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 248980536e8aaddc4f5cd23e285d5b9a.exe -
Executes dropped EXE 1 IoCs
pid Process 3288 16042.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\varas = "C:\\Windows\\16042.exe" 248980536e8aaddc4f5cd23e285d5b9a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\varas = "C:\\Windows\\16042.exe" 248980536e8aaddc4f5cd23e285d5b9a.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\16042.exe 248980536e8aaddc4f5cd23e285d5b9a.exe File created C:\Windows\dfce766b3.imb 248980536e8aaddc4f5cd23e285d5b9a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1736 248980536e8aaddc4f5cd23e285d5b9a.exe 3288 16042.exe 3288 16042.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1736 wrote to memory of 3288 1736 248980536e8aaddc4f5cd23e285d5b9a.exe 97 PID 1736 wrote to memory of 3288 1736 248980536e8aaddc4f5cd23e285d5b9a.exe 97 PID 1736 wrote to memory of 3288 1736 248980536e8aaddc4f5cd23e285d5b9a.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\248980536e8aaddc4f5cd23e285d5b9a.exe"C:\Users\Admin\AppData\Local\Temp\248980536e8aaddc4f5cd23e285d5b9a.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\16042.exe"C:\Windows\16042.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3288
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD582f17ee53e15b045cb9263a6bb8962d0
SHA1a140d17ecb74761fea72a58f6ce544eb1cf999a8
SHA256694a3ac39964cd7b58b12a6767de21407645c153c40748ed272df9304aea0808
SHA5120b88d89243d941fc946da6d1c7cff58d98b22f5f28bb0aaf5ea8478aadc1936a0da181c030fffe87f1876c446d946e55dedf2e17d551f57b4e2e77403e1d98c0
-
Filesize
439B
MD56f32fc687f92feaed10338226b6389f6
SHA10d4542e53d318127dcff9ea574ab015489a6142b
SHA256874d1880a7c2834087b715cdb2a3fc62fff14ef12d138777df62b859f49ed208
SHA5129bb38d68f84d617f822ea1316e4c583b874f22c45a9d9f8095f5f4362ca839219133d7816fde67fc8e188c2d536289f75a9f039c9844f142f53055cb9467d084