Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 05:14
Behavioral task
behavioral1
Sample
2995c500fad1d1cf8b5be0380f6ea6bd.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2995c500fad1d1cf8b5be0380f6ea6bd.exe
Resource
win10v2004-20231215-en
General
-
Target
2995c500fad1d1cf8b5be0380f6ea6bd.exe
-
Size
127KB
-
MD5
2995c500fad1d1cf8b5be0380f6ea6bd
-
SHA1
fb6fe606662973380b9a580a990f0fe194edba80
-
SHA256
6856f73cf4da248af188a08f275d3829d4cf31c83ce5da8b94cb30a1834ffbef
-
SHA512
e22c412dcf0e2edadb2d4d1de3cdd7b91f0530f96179119d83843a128afd33f4a178f7dfcbe30accb31d829bcebe759c0e4aa3bae567a9e1cb6fbe369612725f
-
SSDEEP
3072:Pgj+t/SA5EZv+Py9IPEvMnMpDBPRBovupuMmg6oS:PgjG1W1GPbMp1pBcdr
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ coolserver.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\coolserver = "C:\\Windows\\coolserver.exe" coolserver.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation 2995c500fad1d1cf8b5be0380f6ea6bd.exe -
Executes dropped EXE 1 IoCs
pid Process 4448 coolserver.exe -
resource yara_rule behavioral2/memory/2088-0-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/4448-10-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/2088-9-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/files/0x000200000001fafe-8.dat upx behavioral2/files/0x000200000001fafe-7.dat upx behavioral2/memory/4448-12-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/4448-14-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/4448-13-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/4448-15-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/4448-16-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/4448-17-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/4448-18-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/4448-19-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/4448-20-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/4448-21-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/4448-22-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/4448-23-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/4448-24-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/4448-25-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/4448-26-0x0000000000400000-0x0000000000455000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\coolserver.exe 2995c500fad1d1cf8b5be0380f6ea6bd.exe File created C:\Windows\coolserver.exe 2995c500fad1d1cf8b5be0380f6ea6bd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2088 wrote to memory of 4448 2088 2995c500fad1d1cf8b5be0380f6ea6bd.exe 23 PID 2088 wrote to memory of 4448 2088 2995c500fad1d1cf8b5be0380f6ea6bd.exe 23 PID 2088 wrote to memory of 4448 2088 2995c500fad1d1cf8b5be0380f6ea6bd.exe 23
Processes
-
C:\Users\Admin\AppData\Local\Temp\2995c500fad1d1cf8b5be0380f6ea6bd.exe"C:\Users\Admin\AppData\Local\Temp\2995c500fad1d1cf8b5be0380f6ea6bd.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\coolserver.exe"C:\Windows\coolserver.exe"2⤵
- Adds policy Run key to start application
- Executes dropped EXE
PID:4448
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
127KB
MD52995c500fad1d1cf8b5be0380f6ea6bd
SHA1fb6fe606662973380b9a580a990f0fe194edba80
SHA2566856f73cf4da248af188a08f275d3829d4cf31c83ce5da8b94cb30a1834ffbef
SHA512e22c412dcf0e2edadb2d4d1de3cdd7b91f0530f96179119d83843a128afd33f4a178f7dfcbe30accb31d829bcebe759c0e4aa3bae567a9e1cb6fbe369612725f