Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    159s
  • max time network
    177s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/01/2024, 14:31

General

  • Target

    50d08ba14e86d2b59a4838b128db3e5e.exe

  • Size

    531KB

  • MD5

    50d08ba14e86d2b59a4838b128db3e5e

  • SHA1

    5794656725e103f42c6e492688ed22ae3f0fd952

  • SHA256

    06cc773798e897c25b3b79e4fc43a77fc645b363d288fc4208d86dd0d89b846e

  • SHA512

    af6ea3337ada7e87aed30bd586648adf07b1fc899514834c22b76db6f4bf541f244e23c80837a3b05ffc6f87b2ae9a59d9c85c8cba1046e6c09a44ef76869cb8

  • SSDEEP

    12288:q5iZvUxxc36rURUMK6jXc8RWi2TR7rGOjt9RRg/5Lb2M3njAdl:q0vUxxEiMdjXBR8R7COZ9RRg5njAb

Score
9/10

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies system certificate store 2 TTPs 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\50d08ba14e86d2b59a4838b128db3e5e.exe
    "C:\Users\Admin\AppData\Local\Temp\50d08ba14e86d2b59a4838b128db3e5e.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks computer location settings
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3284
    • C:\Users\Admin\AppData\Local\Temp\n9723\s9723.exe
      "C:\Users\Admin\AppData\Local\Temp\n9723\s9723.exe" 56911d073608394032c27a803hNttDML53hHGAxf8o1/2n0dg07edx1SVprbZNGVfse9C3LQT9Q2syEXbppl3UzH3B7fH0g20EPPv460f1RhIzbqTS3Vc2DRekBLjLI6olhPLFWhFtd+LrXBQv7H77bF4PRl973fEyJyX0PqiegjG08= /v "C:\Users\Admin\AppData\Local\Temp\50d08ba14e86d2b59a4838b128db3e5e.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      PID:436

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\n9723\s9723.exe

    Filesize

    219KB

    MD5

    7102142ea8fd1e51646947341502307a

    SHA1

    d334d9be108bae81d8cd0eaca4b3208c303aa931

    SHA256

    4a2aa0f09b9942ec43d71ae00e3ac4153a737acbd4c904c24688ed47b0943638

    SHA512

    8eb30b6a106703a05ce9e280f8044a6ca7dac2c6657e7ffe8ada79b4ef2a5381dd481a153d285cfb8aacb1550e71392a86a15ca0127d8dfa89457af931c971e8

  • memory/436-13-0x00007FF976920000-0x00007FF9772C1000-memory.dmp

    Filesize

    9.6MB

  • memory/436-14-0x00007FF976920000-0x00007FF9772C1000-memory.dmp

    Filesize

    9.6MB

  • memory/436-15-0x0000000000A70000-0x0000000000A80000-memory.dmp

    Filesize

    64KB

  • memory/436-26-0x00007FF976920000-0x00007FF9772C1000-memory.dmp

    Filesize

    9.6MB

  • memory/436-27-0x00007FF976920000-0x00007FF9772C1000-memory.dmp

    Filesize

    9.6MB

  • memory/436-28-0x0000000000A70000-0x0000000000A80000-memory.dmp

    Filesize

    64KB

  • memory/436-29-0x000000001C090000-0x000000001C55E000-memory.dmp

    Filesize

    4.8MB

  • memory/436-30-0x000000001C760000-0x000000001C7FC000-memory.dmp

    Filesize

    624KB

  • memory/3284-0-0x0000000000A10000-0x0000000000A9B000-memory.dmp

    Filesize

    556KB