Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 13:05
Behavioral task
behavioral1
Sample
3737b56d4596f1c37355af7fbe660b08.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3737b56d4596f1c37355af7fbe660b08.exe
Resource
win10v2004-20231215-en
General
-
Target
3737b56d4596f1c37355af7fbe660b08.exe
-
Size
28KB
-
MD5
3737b56d4596f1c37355af7fbe660b08
-
SHA1
9aaffc8c47034928102d0807b8ea527eada3ada8
-
SHA256
86e8499e566afebf6a44a0c3428510e58c51d7eb8395e146b11cb555e99a4058
-
SHA512
bb3ecdf72775e18d59f5ee73abc2cc532f8fc7c4728e960e7066e1f32e138c0bf5c06ffe5862e650bdb40a37a6bef39066f3cff647770e73c9493e04a0b41f25
-
SSDEEP
768:uBQuvdXSJDPBz9+wglKpw3pXAOIih+b3Oy4i6k/ROfIF:uWwxSRPBz4BKK1AOeb3b/R6IF
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Control Panel\International\Geo\Nation 3737b56d4596f1c37355af7fbe660b08.exe -
resource yara_rule behavioral2/memory/3508-0-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/3508-3-0x0000000000400000-0x0000000000414000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3508 wrote to memory of 3236 3508 3737b56d4596f1c37355af7fbe660b08.exe 92 PID 3508 wrote to memory of 3236 3508 3737b56d4596f1c37355af7fbe660b08.exe 92 PID 3508 wrote to memory of 3236 3508 3737b56d4596f1c37355af7fbe660b08.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\3737b56d4596f1c37355af7fbe660b08.exe"C:\Users\Admin\AppData\Local\Temp\3737b56d4596f1c37355af7fbe660b08.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\a..bat" > nul 2> nul2⤵PID:3236
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210B
MD599ad9f70adb72bdf009eca5d1c0c1206
SHA103ae92cbc10e68cb367f267eefa35ccf82aba209
SHA2566ec6be1cbc1a57616be9190b576f0b50f73ac98c6c28f2da1cab134d5ae65c0d
SHA51204ff3c1ffde0436f4c969f673b07846f6ce01d248e26b9afcc1d9d4900c78412ebbc2138f42dfb845eba5dbbd99fc26bf644c8b82064a057ef77ed36aefb7e65