Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 14:03
Static task
static1
Behavioral task
behavioral1
Sample
39123dfeba3914c52a6d4c0ededbf5d0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
39123dfeba3914c52a6d4c0ededbf5d0.exe
Resource
win10v2004-20231222-en
General
-
Target
39123dfeba3914c52a6d4c0ededbf5d0.exe
-
Size
54KB
-
MD5
39123dfeba3914c52a6d4c0ededbf5d0
-
SHA1
dd25ddbd99c7ed3c0711494b7fb17099226e19da
-
SHA256
cbb7e5c450ebd0a34eb60717defd11163d085c23a07a5090b15ba542d4c3f77b
-
SHA512
aa500545470731c312d60ab2ecc9ba6eb37d09c29e6d22c6360d81071ea7946f5fd85c469ff3a0b3ae1d0954fb4917de156f7e1cbdcbb9f73884d715e149c8bb
-
SSDEEP
1536:4tqTQMx4H5izeIBBTGr4MScOQ40peZ4S4xM:dJxaRkNTcOT0pdS4xM
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 39123dfeba3914c52a6d4c0ededbf5d0.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation lsass.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lsass.exe cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lsass.exe cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 3512 lsass.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3316 wrote to memory of 2420 3316 39123dfeba3914c52a6d4c0ededbf5d0.exe 50 PID 3316 wrote to memory of 2420 3316 39123dfeba3914c52a6d4c0ededbf5d0.exe 50 PID 3316 wrote to memory of 2420 3316 39123dfeba3914c52a6d4c0ededbf5d0.exe 50 PID 3316 wrote to memory of 3952 3316 39123dfeba3914c52a6d4c0ededbf5d0.exe 96 PID 3316 wrote to memory of 3952 3316 39123dfeba3914c52a6d4c0ededbf5d0.exe 96 PID 3316 wrote to memory of 3952 3316 39123dfeba3914c52a6d4c0ededbf5d0.exe 96 PID 3316 wrote to memory of 3512 3316 39123dfeba3914c52a6d4c0ededbf5d0.exe 101 PID 3316 wrote to memory of 3512 3316 39123dfeba3914c52a6d4c0ededbf5d0.exe 101 PID 3316 wrote to memory of 3512 3316 39123dfeba3914c52a6d4c0ededbf5d0.exe 101 PID 3512 wrote to memory of 3480 3512 lsass.exe 103 PID 3512 wrote to memory of 3480 3512 lsass.exe 103 PID 3512 wrote to memory of 3480 3512 lsass.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\39123dfeba3914c52a6d4c0ededbf5d0.exe"C:\Users\Admin\AppData\Local\Temp\39123dfeba3914c52a6d4c0ededbf5d0.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3316 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\39123dfeba3914c52a6d4c0ededbf5d0.exe" "C:\temp4179.tmp"2⤵PID:2420
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\39123dfeba3914c52a6d4c0ededbf5d0.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lsass.exe"2⤵
- Drops startup file
PID:3952
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lsass.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lsass.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lsass.exe" "C:\temp573.tmp"3⤵PID:3480
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
54KB
MD539123dfeba3914c52a6d4c0ededbf5d0
SHA1dd25ddbd99c7ed3c0711494b7fb17099226e19da
SHA256cbb7e5c450ebd0a34eb60717defd11163d085c23a07a5090b15ba542d4c3f77b
SHA512aa500545470731c312d60ab2ecc9ba6eb37d09c29e6d22c6360d81071ea7946f5fd85c469ff3a0b3ae1d0954fb4917de156f7e1cbdcbb9f73884d715e149c8bb