Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
123s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
09/01/2024, 07:28
Behavioral task
behavioral1
Sample
4db6685d97a57f865bf71b49e3f4707f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4db6685d97a57f865bf71b49e3f4707f.exe
Resource
win10v2004-20231215-en
General
-
Target
4db6685d97a57f865bf71b49e3f4707f.exe
-
Size
85KB
-
MD5
4db6685d97a57f865bf71b49e3f4707f
-
SHA1
4dd670cf2fde0ce09e0e22f854a8478cbea86570
-
SHA256
28821f2c1522e60b54a5a2f390cccad2a0bbc2b86d342554b4207d170b2683d6
-
SHA512
cc42cd67dd0a7a304fbd8bcda72b9244a9b214b7d451a62744e4037232635c80bbbac1df55346f4c313de0f2845be5add787d70d0e77cb2c6e2a4f9d19d512ba
-
SSDEEP
1536:wHLmLTMUFRy1U/9PEBVYflqhHSOkyx9wVCoIsGKJqPUQKc:wHLMT01U/9PEUlqhPx9QCqJ0sQK
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation 4db6685d97a57f865bf71b49e3f4707f.exe -
resource yara_rule behavioral2/memory/3240-0-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral2/memory/3240-2-0x0000000000400000-0x0000000000437000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3240 wrote to memory of 4800 3240 4db6685d97a57f865bf71b49e3f4707f.exe 18 PID 3240 wrote to memory of 4800 3240 4db6685d97a57f865bf71b49e3f4707f.exe 18 PID 3240 wrote to memory of 4800 3240 4db6685d97a57f865bf71b49e3f4707f.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\4db6685d97a57f865bf71b49e3f4707f.exe"C:\Users\Admin\AppData\Local\Temp\4db6685d97a57f865bf71b49e3f4707f.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\4602.tmp.bat" > nul 2> nul2⤵PID:4800
-