Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
01/01/2024, 19:33
Static task
static1
Behavioral task
behavioral1
Sample
3db19899363af81978e1f897ab567ac8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3db19899363af81978e1f897ab567ac8.exe
Resource
win10v2004-20231215-en
General
-
Target
3db19899363af81978e1f897ab567ac8.exe
-
Size
2.5MB
-
MD5
3db19899363af81978e1f897ab567ac8
-
SHA1
86036545c2a248532a3c70754fa531c82b65875d
-
SHA256
e846cae9784a3c49b62105bceb2c6bbae7be4341f730ceb5605702271b037cf2
-
SHA512
6f6b2fc76ad36c3b06a28b00264c80275b38927417413477624115ec6a4da855398b305836f04b47f6b3403c451f046df030691339a5601e9791fcd1d02a8a7e
-
SSDEEP
49152:oky796EvMtTx435MtV+Oj29Ls3t/cwCxHHlc2KP1z8o/MO2Uqed3yBI1rM:o7AEvgVOy29Ls3JslVYzjMO26il
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\Control Panel\International\Geo\Nation 3db19899363af81978e1f897ab567ac8.tmp -
Executes dropped EXE 2 IoCs
pid Process 4348 3db19899363af81978e1f897ab567ac8.tmp 3032 WMF.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3032 WMF.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2516 wrote to memory of 4348 2516 3db19899363af81978e1f897ab567ac8.exe 91 PID 2516 wrote to memory of 4348 2516 3db19899363af81978e1f897ab567ac8.exe 91 PID 2516 wrote to memory of 4348 2516 3db19899363af81978e1f897ab567ac8.exe 91 PID 4348 wrote to memory of 3032 4348 3db19899363af81978e1f897ab567ac8.tmp 92 PID 4348 wrote to memory of 3032 4348 3db19899363af81978e1f897ab567ac8.tmp 92 PID 4348 wrote to memory of 3032 4348 3db19899363af81978e1f897ab567ac8.tmp 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\3db19899363af81978e1f897ab567ac8.exe"C:\Users\Admin\AppData\Local\Temp\3db19899363af81978e1f897ab567ac8.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\is-VC67T.tmp\3db19899363af81978e1f897ab567ac8.tmp"C:\Users\Admin\AppData\Local\Temp\is-VC67T.tmp\3db19899363af81978e1f897ab567ac8.tmp" /SL5="$701CE,2280122,153088,C:\Users\Admin\AppData\Local\Temp\3db19899363af81978e1f897ab567ac8.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Users\Admin\AppData\Local\Temp\is-6T8F9.tmp\WMF.exe"C:\Users\Admin\AppData\Local\Temp\is-6T8F9.tmp\WMF.exe" /aid=0 /sub=0 /sid=42 /name="crysis_2.rar" /fid= /stats=AReQ4iWsktD0UBRZXNhssOlbsZhQuk8Z971JHLOgulDVn83bn6dO334Ixt3BBwA537YacWzfPb4WgREJIFs8iw== /param=03⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3032
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
893KB
MD5d8d8d2891de99f23c9f88664d63465a1
SHA149137fe87ed0020a0f1b227d6ca2f8e9e561e1f1
SHA2560f1d8b0273016df023b74ddc926b551cc99fb3ba14b691276ff19ee64284176e
SHA5123f9e49ff85fccd34cd2d7159b3096c730de4abb2f8a9767272861b1751de716d2674a01a3b0dd0e3d1634260c6e8853106c7a0d96ee3f225f74e7156fa70d93a
-
Filesize
92KB
MD562da910f9cbf57deed104f464b009095
SHA14e895a9cb93aa3691a347ccab1133c4f1ed0c01c
SHA256594360ef677e52e6aaa226fea4638bfe3b932abebd3b68d11fd6f9a8885bf903
SHA512a4a7de82085a90f0e1d7b75e3a418aa3994dd2202bc3ba1d6d838b51f3bae672a1015d181a186b7d3b5e35e1ea1b0ba557ed49a463b18b1ff9e3a31a27f1aef6