Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
90s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19/01/2024, 07:56
Static task
static1
Behavioral task
behavioral1
Sample
6717242a21f10b17fceb30a6305912d9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6717242a21f10b17fceb30a6305912d9.exe
Resource
win10v2004-20231215-en
General
-
Target
6717242a21f10b17fceb30a6305912d9.exe
-
Size
94KB
-
MD5
6717242a21f10b17fceb30a6305912d9
-
SHA1
9aae99229972641184658e3ae834d3c83be98be3
-
SHA256
73d9124054ea2a5db220408b0f3cf794d92984e06d1a1563cfd84e74fe302f6e
-
SHA512
9b6a76bf12373894ef6f4f3f4ac3e3908817fb7a67ec62abf424fe025fbcd02be3f02c207719b9e12978adb4127417b4dd1ef9a08276d8c7183185934c33ab46
-
SSDEEP
1536:bfg+M2Y9oH+cpTKeyaI0Z/od8bDbRvU5yYeVYXrgITAGXBB3exYEjpepikFIy:bfgyY9oH+cTKGI0Z/oooeVYXrgI0GXW4
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 6717242a21f10b17fceb30a6305912d9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1992 wrote to memory of 808 1992 6717242a21f10b17fceb30a6305912d9.exe 88 PID 1992 wrote to memory of 808 1992 6717242a21f10b17fceb30a6305912d9.exe 88 PID 1992 wrote to memory of 808 1992 6717242a21f10b17fceb30a6305912d9.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\6717242a21f10b17fceb30a6305912d9.exe"C:\Users\Admin\AppData\Local\Temp\6717242a21f10b17fceb30a6305912d9.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Qzj..bat" > nul 2> nul2⤵PID:808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210B
MD58ee2f3d5925fb1d515ce3c9e368f8f5e
SHA1b8502824b365841b9162ced8a1141acf3b9c6e89
SHA256f30e50bc035507827c8afa1d3e92dd1cbaa8bb850e377dbb6b33e44eb2d8224d
SHA512724e6c7b6ed42879167ba9451b59ab5154b8ef37b7d7b75f2f909a332b76f39a6e9da8f319978447428ca04dc8af247463b49b5299c46633b68efeed068f871c