Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    0s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/01/2024, 07:05

General

  • Target

    FFA.exe

  • Size

    652KB

  • MD5

    7589fe75123045e6f30eab511e55bc3a

  • SHA1

    34e473bb2385e923feccb4aa5375a56924893a31

  • SHA256

    747f15512f3b04420d0bc2264192fb1f8a4cdf81993afb191ae835d86b650cd8

  • SHA512

    fba1f53b6c2e8954e906ba2343e2b1a9f0f88ae69df0eab567af3ece4bc93d6b5291cc55e0aaf2b3d7e7d4e5457ac95eaacbd027425e3fff9df467e28627adcf

  • SSDEEP

    12288:sRvnERMs3azRIMbcr6ZwchpZJmdhBPrx4PkAd5EBgv5gBjl:s5nm3fe5bMprx4c05EBgxgb

Score
8/10

Malware Config

Signatures

  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\FFA.exe
    "C:\Users\Admin\AppData\Local\Temp\FFA.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1748
    • C:\Users\Admin\AppData\Local\Temp\server.exe
      "C:\Users\Admin\AppData\Local\Temp\server.exe"
      2⤵
      • Executes dropped EXE
      PID:736
    • C:\Users\Admin\AppData\Local\Temp\gabberoneshay.exe
      "C:\Users\Admin\AppData\Local\Temp\gabberoneshay.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:3972
      • C:\Users\Admin\AppData\Roaming\spoolsv.exe
        /d C:\Users\Admin\AppData\Local\Temp\gabberoneshay.exe
        3⤵
          PID:3996
        • C:\Windows\SysWOW64\netsh.exe
          netsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\spoolsv.exe" CityScape Enable
          3⤵
          • Modifies Windows Firewall
          PID:1548

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\gabberoneshay.exe

      Filesize

      68KB

      MD5

      08dff461780f398b24c1cf2e05cca282

      SHA1

      e25ab2aef86e8f04a999c558885c04695195fd7c

      SHA256

      542b205ce9d2521234751f85e0069f63102386dedacd8e008811862be6dba90c

      SHA512

      4a8f38eb7347d24dd2a7ab2e975151325d668aa4a3562738f81617c9bfc13e6ba3b514fd4644448f2cdc92abe098499558249fb5a9a88f0673341d001aee663a

    • C:\Users\Admin\AppData\Local\Temp\gabberoneshay.exe

      Filesize

      47KB

      MD5

      271e737e14afa557a2bfd66400456360

      SHA1

      3b0c96ed2baeec8cbd16246882f62b5f24a940c2

      SHA256

      78b8f7fb6255586c71fffad468840d5c6d65f3ece7b78818dcdf942c6b69f53b

      SHA512

      f0f389c72bc356200fbe42d213a0aff6c58af400c0286caab1e88b54505be945e823dd457de366d2e642c229837c7b522a6dd5f3063c642f26ec6df22b96d4fb

    • C:\Users\Admin\AppData\Local\Temp\gabberoneshay.exe

      Filesize

      51KB

      MD5

      a1053244845e2ddb37cb70fd73e0aaf4

      SHA1

      ef8a2df5b425d06305b0a3bd9688502c98225d3f

      SHA256

      514748b7ddd43595ed5b55727bb1d4eb1f51930c602a81b5df2e602c4f4e577d

      SHA512

      d910a9466855c6b8fc7ece58712ffa695718de99761421fb9768613037cf665fccbb02b1fb1ca08c654883a583e57cb21248dccb05caae0028b0aac497c4b818

    • C:\Users\Admin\AppData\Local\Temp\server.exe

      Filesize

      31KB

      MD5

      f630e1933e6d7c5e40cd7f2deb32119c

      SHA1

      ed19cf8905f3fccfd0f0bf4caea421efd6555413

      SHA256

      6399a56d336a4749a47b92655025b4de4860efa232ea3d70c51a6a8ff96c8fe9

      SHA512

      e4a543cc0393fb60553259a11980062b9561beb19c893e9664b574a453c54f4ca246cd62a78c49676ff984197262a808f15cddb7212e9a7c38fefcfeaa805e25

    • C:\Users\Admin\AppData\Local\Temp\server.exe

      Filesize

      57KB

      MD5

      f50d42d0a24c166e0fbcd5386b20ab61

      SHA1

      3ca2af5d8aa863d3dd83fba92bd5f8d42a0427ec

      SHA256

      78c0759d27399c5f4d1b646a3dc6827f32c6945171877e273c211eb4b7493b4f

      SHA512

      88e4643673d8d51ac6804e1792ae130b4cd9ff94bd65008a0182e68fb72924d455d22c83ca508801d3fdfe5a7465426b6623cb01f71dc2d54ed8a1d8510a7760

    • C:\Users\Admin\AppData\Local\Temp\server.exe

      Filesize

      19KB

      MD5

      903521a64fd0fb65aa933901fec12f2d

      SHA1

      b0affc70b17e31cc34ce5fda1a3ce0bfdee2f058

      SHA256

      5daf035e2d6d3b62c1d68624612c9383272fd4a3363c6462ae9440ec06cb22ba

      SHA512

      f85e9cd035d61b6deb39de079103da405bda141a6c4cf6b8b2b6afb053df317dfed77dac6e9296d7369ee4d56fc3e4db0e77714cc8c7ca80d75ccd6ff2f684ce

    • C:\Users\Admin\AppData\Roaming\mmvFMROV

      Filesize

      39KB

      MD5

      560d988d6371a692d48670a652b16f10

      SHA1

      7ad5c1f0f05ef1ba8291b0554e776a066015ef3d

      SHA256

      25a6cde14ee6a6dd49c41b246b6de26c70ef82109b421bdbca8661af308e0b7a

      SHA512

      78352c128e8f78b2e566062f8e3e73e27e606d0a5a301264c42b59d6b9a3b2856e927d74ed3a9ba57e6fef72376db10159dc00e76b102a8cf7e72292b4070729

    • C:\Users\Admin\AppData\Roaming\spoolsv.exe

      Filesize

      89KB

      MD5

      0e0a28d69ce5ab108a1b6944fd57d773

      SHA1

      5dc867c7016582ebc2c1a12472b0fca3f2d1b2d4

      SHA256

      5592a1aaf424c829b42f869d1302ec485bfe4e8e27663c54c82d04ccf7eacc9b

      SHA512

      810da7630b7d1154b2703723c0df1ff32b6e2f224d8752090db2481ad2058f18e705b93a91f20a89cc5444012cc51367369fd506808f4caeb56b1173b6911dc1

    • C:\Users\Admin\AppData\Roaming\spoolsv.exe

      Filesize

      128KB

      MD5

      9565b3b763601164d276ec2011c90b38

      SHA1

      6b9428b9874657d199c83b497411035f4943495d

      SHA256

      671f261902715279b9e3143c01d5e5c73fd32ba9366d648992144d6d3c5439c4

      SHA512

      bb7d24ca4643ba3ab9a0ac646f4ea35a5f7ee8ae417bdd9c7ca3620c3c7a22e97399b87b245bee1a616fcab8d411231a14b7d1b38c7fde3513a6fd0504aeecb9

    • memory/1748-0-0x0000000074770000-0x0000000074D21000-memory.dmp

      Filesize

      5.7MB

    • memory/1748-1-0x0000000074770000-0x0000000074D21000-memory.dmp

      Filesize

      5.7MB

    • memory/1748-27-0x0000000074770000-0x0000000074D21000-memory.dmp

      Filesize

      5.7MB

    • memory/1748-2-0x00000000014D0000-0x00000000014E0000-memory.dmp

      Filesize

      64KB