Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    119s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/12/2023, 14:03

General

  • Target

    39123dfeba3914c52a6d4c0ededbf5d0.exe

  • Size

    54KB

  • MD5

    39123dfeba3914c52a6d4c0ededbf5d0

  • SHA1

    dd25ddbd99c7ed3c0711494b7fb17099226e19da

  • SHA256

    cbb7e5c450ebd0a34eb60717defd11163d085c23a07a5090b15ba542d4c3f77b

  • SHA512

    aa500545470731c312d60ab2ecc9ba6eb37d09c29e6d22c6360d81071ea7946f5fd85c469ff3a0b3ae1d0954fb4917de156f7e1cbdcbb9f73884d715e149c8bb

  • SSDEEP

    1536:4tqTQMx4H5izeIBBTGr4MScOQ40peZ4S4xM:dJxaRkNTcOT0pdS4xM

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\39123dfeba3914c52a6d4c0ededbf5d0.exe
    "C:\Users\Admin\AppData\Local\Temp\39123dfeba3914c52a6d4c0ededbf5d0.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3316
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\39123dfeba3914c52a6d4c0ededbf5d0.exe" "C:\temp4179.tmp"
      2⤵
        PID:2420
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\39123dfeba3914c52a6d4c0ededbf5d0.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lsass.exe"
        2⤵
        • Drops startup file
        PID:3952
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lsass.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lsass.exe"
        2⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3512
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lsass.exe" "C:\temp573.tmp"
          3⤵
            PID:3480

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\temp4179.tmp

        Filesize

        54KB

        MD5

        39123dfeba3914c52a6d4c0ededbf5d0

        SHA1

        dd25ddbd99c7ed3c0711494b7fb17099226e19da

        SHA256

        cbb7e5c450ebd0a34eb60717defd11163d085c23a07a5090b15ba542d4c3f77b

        SHA512

        aa500545470731c312d60ab2ecc9ba6eb37d09c29e6d22c6360d81071ea7946f5fd85c469ff3a0b3ae1d0954fb4917de156f7e1cbdcbb9f73884d715e149c8bb

      • memory/3316-7-0x0000000000400000-0x0000000000416000-memory.dmp

        Filesize

        88KB

      • memory/3512-11-0x0000000000400000-0x0000000000416000-memory.dmp

        Filesize

        88KB

      • memory/3512-12-0x0000000000400000-0x0000000000416000-memory.dmp

        Filesize

        88KB

      • memory/3512-13-0x0000000000400000-0x0000000000416000-memory.dmp

        Filesize

        88KB

      • memory/3512-14-0x0000000000400000-0x0000000000416000-memory.dmp

        Filesize

        88KB

      • memory/3512-15-0x0000000000400000-0x0000000000416000-memory.dmp

        Filesize

        88KB

      • memory/3512-16-0x0000000000400000-0x0000000000416000-memory.dmp

        Filesize

        88KB

      • memory/3512-17-0x0000000000400000-0x0000000000416000-memory.dmp

        Filesize

        88KB

      • memory/3512-18-0x0000000000400000-0x0000000000416000-memory.dmp

        Filesize

        88KB

      • memory/3512-19-0x0000000000400000-0x0000000000416000-memory.dmp

        Filesize

        88KB

      • memory/3512-20-0x0000000000400000-0x0000000000416000-memory.dmp

        Filesize

        88KB

      • memory/3512-21-0x0000000000400000-0x0000000000416000-memory.dmp

        Filesize

        88KB

      • memory/3512-22-0x0000000000400000-0x0000000000416000-memory.dmp

        Filesize

        88KB

      • memory/3512-23-0x0000000000400000-0x0000000000416000-memory.dmp

        Filesize

        88KB