Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
14/01/2024, 02:18
Static task
static1
Behavioral task
behavioral1
Sample
5766d37445a8c0edec197f42bbb2c8e1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5766d37445a8c0edec197f42bbb2c8e1.exe
Resource
win10v2004-20231215-en
General
-
Target
5766d37445a8c0edec197f42bbb2c8e1.exe
-
Size
98KB
-
MD5
5766d37445a8c0edec197f42bbb2c8e1
-
SHA1
018d5504668d35372d975c8baec1fd743b36f6a4
-
SHA256
47d345d807d05205487297ea2835f2f2a08e2201e35af5a84583c40c22218dd7
-
SHA512
aeda3513561298e8a5a6b5f9213736684df262523adb1ffa863ac40dbe5f236792b9ccb37b98d442e389ee2826fea6e84c8d8bbdb53e71819ef6ed4df41e57ff
-
SSDEEP
1536:lsKZbKJC4AC9hKwx2PV5HE7itqVmF0mWjJ3kv1RCj7CMLFCALkvOrmw4m2OE:ecB4AC3QV5HE7A0lsRCdhC9GrOzF
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Control Panel\International\Geo\Nation 5766d37445a8c0edec197f42bbb2c8e1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2692 wrote to memory of 4724 2692 5766d37445a8c0edec197f42bbb2c8e1.exe 92 PID 2692 wrote to memory of 4724 2692 5766d37445a8c0edec197f42bbb2c8e1.exe 92 PID 2692 wrote to memory of 4724 2692 5766d37445a8c0edec197f42bbb2c8e1.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\5766d37445a8c0edec197f42bbb2c8e1.exe"C:\Users\Admin\AppData\Local\Temp\5766d37445a8c0edec197f42bbb2c8e1.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Vnj..bat" > nul 2> nul2⤵PID:4724
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210B
MD58e2444424cbe815e7aad3cfb48d103ee
SHA1a71f7831a2ac1f9f6b7d72710ad21d4a098d1ea1
SHA2568bf25f88c62d7f6acc4c39975d0730537617df6d336949a224c1aef1e5e4acee
SHA512c58d239722325730a6519ff3e87d221cc2cf0dfab526ab533b08065822ceeabe8a7edd00016ab15d6105f79e1e6371da79c59fae06be3303dfdea158b4ecc73d