Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
182s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 05:01
Static task
static1
Behavioral task
behavioral1
Sample
293178bffa66fd519b4a33492344a03d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
293178bffa66fd519b4a33492344a03d.exe
Resource
win10v2004-20231215-en
General
-
Target
293178bffa66fd519b4a33492344a03d.exe
-
Size
64KB
-
MD5
293178bffa66fd519b4a33492344a03d
-
SHA1
cc4efa0f65c7a23c88281e1b354648feff4a7188
-
SHA256
f34e7e8533ba668ee17c51299df695b1ba71e383b4a3575027b7f1d9fbd918dc
-
SHA512
7dfdd7fd57d41c40c5057dc15c84f8a9fef060f797842cdeda0ce1806c51accdd58b218316c24847d455c56e7df643b874ef45f942332a80753a082a5ddbd73f
-
SSDEEP
768:7aND5oKh4khWgoQ9lTvUNsE92tt7LYoQ3E38sdXzxn81XgX/GPiLu/T7GTm:7aND5oqxlTv8se0B8oQ0FX4XgX/G
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\Control Panel\International\Geo\Nation 293178bffa66fd519b4a33492344a03d.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\fagianom.pbk 293178bffa66fd519b4a33492344a03d.exe File opened for modification C:\Windows\SysWOW64\fagianom.pbk 293178bffa66fd519b4a33492344a03d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: LoadsDriver 18 IoCs
pid Process 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 656 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3032 293178bffa66fd519b4a33492344a03d.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3032 wrote to memory of 1620 3032 293178bffa66fd519b4a33492344a03d.exe 115 PID 3032 wrote to memory of 1620 3032 293178bffa66fd519b4a33492344a03d.exe 115 PID 3032 wrote to memory of 1620 3032 293178bffa66fd519b4a33492344a03d.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\293178bffa66fd519b4a33492344a03d.exe"C:\Users\Admin\AppData\Local\Temp\293178bffa66fd519b4a33492344a03d.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\293178~1.EXE > nul2⤵PID:1620
-