Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    152s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/01/2024, 16:26

General

  • Target

    4979d365f1279a84525cfaae1025b300.exe

  • Size

    96KB

  • MD5

    4979d365f1279a84525cfaae1025b300

  • SHA1

    a05cabf1e2c23fab056bd4d183704f1d3f8b3390

  • SHA256

    6e43743039352edff38845ad63e4e60bf9ea055cecda04d4dda5179edf6f8328

  • SHA512

    c2dd9f41397064f0cb97b93551f5d0ed00a88cb66dd37e5f80ca831fa954de6ec65faa925930bd004af54f7c25cb58d5382faec38008f665cbe7921d86b6dc9a

  • SSDEEP

    1536:2GBTozhgzWwmhLmncdkadGVScGYJXeiyCnO+TI4K4I4i404R4Z1VcvsJOpPpMm4S:dEzaW6cOadGRJuH7ut/Tdvd+hXV/vU3n

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4979d365f1279a84525cfaae1025b300.exe
    "C:\Users\Admin\AppData\Local\Temp\4979d365f1279a84525cfaae1025b300.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1016
    • C:\Users\Admin\keiij.exe
      "C:\Users\Admin\keiij.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3740

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\keiij.exe

    Filesize

    96KB

    MD5

    b082eb9cc28bd147234e0586d6ddfdfb

    SHA1

    4da3ff3526fd879249a13070d6939267f8750a53

    SHA256

    a723c2075898639b9262a2bb9b159f89094b22d9d72c15932cdade519bf0d749

    SHA512

    25b0cbed03db2c26adb07683abe5fdbd66637eeb317b51c55ff61db496db461659b31a40329aafcec10ab34a1aafc863e25817cadd27ba152f72582b6ccfb4a5