Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
14/01/2024, 11:16
Behavioral task
behavioral1
Sample
5b190e8c3c0c6c4538c966bb67ad26fe.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5b190e8c3c0c6c4538c966bb67ad26fe.exe
Resource
win10v2004-20231215-en
General
-
Target
5b190e8c3c0c6c4538c966bb67ad26fe.exe
-
Size
56KB
-
MD5
5b190e8c3c0c6c4538c966bb67ad26fe
-
SHA1
005adf4ef033a55166fe9794597e26d5796462d6
-
SHA256
53582b607f29afc762b73cb4c17db0f8fc2c127cc5bcd740fd39872daa902f2e
-
SHA512
a264fcb451a5d30647eb84264d177514788d5c455172bea570de9dabb94d954e714aca80caa15f323223ff8efb490649ea3e70d05529579aff74a8b8a2cae97f
-
SSDEEP
768:ys2J4uBAJfqFCs8axiEFaGKIT2+1VTvS/t9YBB/UqPYlArdGpm8MGmTRikY/eZsF:8JAsiaKICETIYQO5UpEGGuAEOB
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation 5b190e8c3c0c6c4538c966bb67ad26fe.exe -
Executes dropped EXE 1 IoCs
pid Process 444 123456789.exe -
resource yara_rule behavioral2/memory/2216-0-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/files/0x000300000001e982-5.dat upx behavioral2/memory/444-9-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/444-10-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/2216-11-0x0000000000400000-0x000000000042D000-memory.dmp upx -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\123456789 = "C:\\Users\\Admin\\AppData\\Local\\123456789.exe" 5b190e8c3c0c6c4538c966bb67ad26fe.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\123456789 = "C:\\Users\\Admin\\AppData\\Local\\123456789.exe" 5b190e8c3c0c6c4538c966bb67ad26fe.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices\123456789 = "C:\\Users\\Admin\\AppData\\Local\\123456789.exe" 5b190e8c3c0c6c4538c966bb67ad26fe.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServicesOnce\123456789 = "C:\\Users\\Admin\\AppData\\Local\\123456789.exe" 5b190e8c3c0c6c4538c966bb67ad26fe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2216 5b190e8c3c0c6c4538c966bb67ad26fe.exe 2216 5b190e8c3c0c6c4538c966bb67ad26fe.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2216 wrote to memory of 444 2216 5b190e8c3c0c6c4538c966bb67ad26fe.exe 88 PID 2216 wrote to memory of 444 2216 5b190e8c3c0c6c4538c966bb67ad26fe.exe 88 PID 2216 wrote to memory of 444 2216 5b190e8c3c0c6c4538c966bb67ad26fe.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b190e8c3c0c6c4538c966bb67ad26fe.exe"C:\Users\Admin\AppData\Local\Temp\5b190e8c3c0c6c4538c966bb67ad26fe.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Users\Admin\AppData\Local\123456789.exe"C:\Users\Admin\AppData\Local\123456789.exe"2⤵
- Executes dropped EXE
PID:444
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD55b190e8c3c0c6c4538c966bb67ad26fe
SHA1005adf4ef033a55166fe9794597e26d5796462d6
SHA25653582b607f29afc762b73cb4c17db0f8fc2c127cc5bcd740fd39872daa902f2e
SHA512a264fcb451a5d30647eb84264d177514788d5c455172bea570de9dabb94d954e714aca80caa15f323223ff8efb490649ea3e70d05529579aff74a8b8a2cae97f