Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 04:34
Static task
static1
Behavioral task
behavioral1
Sample
285b3a6320d06ee286ffa987dc7672f8.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
285b3a6320d06ee286ffa987dc7672f8.exe
Resource
win10v2004-20231222-en
General
-
Target
285b3a6320d06ee286ffa987dc7672f8.exe
-
Size
103KB
-
MD5
285b3a6320d06ee286ffa987dc7672f8
-
SHA1
2416cfaedc110dd66445086662fc0855793dce3f
-
SHA256
7ca7cb72e1be66472b48d614b94380e79804bc916373f0186f5460cf64ccdaa5
-
SHA512
e9e4dadf6f0c6ec5e1893b56ae933ccce9c62006b7c20f38af20fd79cf524866041c337b0e70954d6e5ed142ed96d29628456b92222226b020075f9b729edf8e
-
SSDEEP
1536:DPgy6TWEyq+kzZMuerK/JOfWh+CkMeJwzuRAjOpJuVxvmZqA:DP5xBqXGZqJc52CvpEVxvmZ
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 285b3a6320d06ee286ffa987dc7672f8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4440 wrote to memory of 1128 4440 285b3a6320d06ee286ffa987dc7672f8.exe 63 PID 4440 wrote to memory of 1128 4440 285b3a6320d06ee286ffa987dc7672f8.exe 63 PID 4440 wrote to memory of 1128 4440 285b3a6320d06ee286ffa987dc7672f8.exe 63
Processes
-
C:\Users\Admin\AppData\Local\Temp\285b3a6320d06ee286ffa987dc7672f8.exe"C:\Users\Admin\AppData\Local\Temp\285b3a6320d06ee286ffa987dc7672f8.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Ckp..bat" > nul 2> nul2⤵PID:1128
-