Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    162s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/01/2024, 22:34

General

  • Target

    3f32c05e9865ef5de936a6ed48a927cb.exe

  • Size

    128KB

  • MD5

    3f32c05e9865ef5de936a6ed48a927cb

  • SHA1

    a1481a3d1e5be0de26d5182b8f0b3e11f508f7e7

  • SHA256

    817ff07f08a8d6242ff7ad2547300068919d5bb2f17cf625230332257eaa1b77

  • SHA512

    b36685b42419235d867a216643574eb0b1b9d1aa62b149cd32c6b13d00db827a73581e9ffb3fd0450df13b3f1d3b8864f7b9485997cfdb93bbe2cf9f7219ec84

  • SSDEEP

    3072:4fwbcHVICc7soi3rK+/7uqelMYa3S1H2p:ewbAVFc7st3rK+/7uqelMYa3S1H

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 50 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3f32c05e9865ef5de936a6ed48a927cb.exe
    "C:\Users\Admin\AppData\Local\Temp\3f32c05e9865ef5de936a6ed48a927cb.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:664
    • C:\Users\Admin\wialuic.exe
      "C:\Users\Admin\wialuic.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4140

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\wialuic.exe

    Filesize

    128KB

    MD5

    55b5ae92b54b70888ad5a6bce4e27b9d

    SHA1

    64fd7f2d153a9133ebfbd118c67f166ea9c61cf9

    SHA256

    51a5733d9048ebcb3f6af879385fdb7bf547f0f820fcefebd85f4edf20159726

    SHA512

    fadd61fbb32813c62d5dbea776d8e70619db773c597c76ed0737fa17b11f07263e0acc57ec2b3c372078bedb189ed6c0b2163d69eaa540cc4d3fff61c7472432