Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    77s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/01/2024, 22:04

General

  • Target

    42048a61da76b88c075b9752dfed4359.exe

  • Size

    68KB

  • MD5

    42048a61da76b88c075b9752dfed4359

  • SHA1

    8cbae9276790eb0e9ecc619dfc2a53a6da3ed374

  • SHA256

    768dd6ae63b5b01e5b7f0c3d52433e483c1d36e2a9645db30bba1a12d56130dc

  • SHA512

    632c689cce04aff80673d01e2369413cfaed287fc84bc9cdff6348b2149629375b8b00d2cac297a0706ed5d614c685e907ae5511d2bce1b8965544583eb42242

  • SSDEEP

    768:2cqliTduSTAl+qOQSgFrhKo//WomvdfQXwYt1IEDIefZsK:NqIxTTAcqOK3qowgnt1d

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\42048a61da76b88c075b9752dfed4359.exe
    "C:\Users\Admin\AppData\Local\Temp\42048a61da76b88c075b9752dfed4359.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:756
    • C:\Users\Admin\Admin.exe
      "C:\Users\Admin\Admin.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1664

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\Admin.exe

    Filesize

    68KB

    MD5

    143a95165bc31bc420fa48f9efc75720

    SHA1

    fea375da8f5b21b454bc55abb68eed9713799ceb

    SHA256

    89953b119f716ed261ac0aac2691dac9c551ee02e2e07cf621fbd52356ddbbbf

    SHA512

    bfe4e961d8e102e99d85db14f76c3a1956f7f71703107a98cc69bf9f2e21bb7f9d2485bc25c0fce1da6a68649842c16ed4f299fb8093685448f8c42acd1ec318

  • memory/756-0-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/1664-33-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB