Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13/01/2024, 07:18
Static task
static1
Behavioral task
behavioral1
Sample
58509938dab387c484fecd5184fbef7f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
58509938dab387c484fecd5184fbef7f.exe
Resource
win10v2004-20231215-en
General
-
Target
58509938dab387c484fecd5184fbef7f.exe
-
Size
252KB
-
MD5
58509938dab387c484fecd5184fbef7f
-
SHA1
bbddeabb74f060b349e43b4ba80db60e780d6a25
-
SHA256
dc94b4affda2f2ccce65e9c70d5673c796c1418ffe11e1c956bda870d636758c
-
SHA512
2d4ed0b3f5d53a23b887f57a3e7b0f36d0ba60d04a5d61237dbc5119fbb5f8ad539f874d5ec29f94fd2992cba5c9f399dde2b75efcb3506aee5d00d2ac013ecd
-
SSDEEP
6144:EIO/OELQYCM/IsVVUUUEDOWb+BRuQRBuk+3g:EIIlEM/DUUUEDOWCBRbRkk+g
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 58509938dab387c484fecd5184fbef7f.exe -
Executes dropped EXE 1 IoCs
pid Process 1232 qwrtaw5.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\sysinternals = "C:\\ProgramData\\qwrtaw5.exe" qwrtaw5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 58509938dab387c484fecd5184fbef7f.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 qwrtaw5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier qwrtaw5.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 58509938dab387c484fecd5184fbef7f.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2616 58509938dab387c484fecd5184fbef7f.exe Token: SeDebugPrivilege 1232 qwrtaw5.exe Token: SeDebugPrivilege 1232 qwrtaw5.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2616 wrote to memory of 1232 2616 58509938dab387c484fecd5184fbef7f.exe 96 PID 2616 wrote to memory of 1232 2616 58509938dab387c484fecd5184fbef7f.exe 96 PID 2616 wrote to memory of 1232 2616 58509938dab387c484fecd5184fbef7f.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\58509938dab387c484fecd5184fbef7f.exe"C:\Users\Admin\AppData\Local\Temp\58509938dab387c484fecd5184fbef7f.exe"1⤵
- Checks computer location settings
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\ProgramData\qwrtaw5.exe"C:\ProgramData\qwrtaw5.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:1232
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
252KB
MD558509938dab387c484fecd5184fbef7f
SHA1bbddeabb74f060b349e43b4ba80db60e780d6a25
SHA256dc94b4affda2f2ccce65e9c70d5673c796c1418ffe11e1c956bda870d636758c
SHA5122d4ed0b3f5d53a23b887f57a3e7b0f36d0ba60d04a5d61237dbc5119fbb5f8ad539f874d5ec29f94fd2992cba5c9f399dde2b75efcb3506aee5d00d2ac013ecd
-
Filesize
34KB
MD5e118330b4629b12368d91b9df6488be0
SHA1ce90218c7e3b90df2a3409ec253048bb6472c2fd
SHA2563a0f2936b8c45e8ba3458d69d7859a63844469e698652e15fb56639d32f40cc9
SHA512ac91c04cb20223dbaaf594440cb778dff36e857921be427c8528ba4c6cdb3e8bf8e71e1ae8af7bde9c04ff5b97b379231625bc1a2b66aba2f98cd340cd8a94b0