Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
24/01/2024, 01:35
Behavioral task
behavioral1
Sample
38d9253de365a8ef1551581ce9a78245.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
38d9253de365a8ef1551581ce9a78245.exe
Resource
win10v2004-20231222-en
General
-
Target
38d9253de365a8ef1551581ce9a78245.exe
-
Size
115KB
-
MD5
38d9253de365a8ef1551581ce9a78245
-
SHA1
ca7ca5df2dc9e54a0ec58cae54bb214b7de9a381
-
SHA256
bfb566edd093383033a1f6d5d67a4e4517242b8d52671f46a4126123034db51e
-
SHA512
7ed560611881be81b5830afea2f9d5c124ebd344081fa8f1b6efb4b0323758518b3a40ac5a5368fdcd181580d0202f438c4ef7eb4ad912816e1b5a31714fcc2c
-
SSDEEP
1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp01F:z6a+CdOOtEvwDpjczX
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation 38d9253de365a8ef1551581ce9a78245.exe -
Executes dropped EXE 1 IoCs
pid Process 4352 asih.exe -
resource yara_rule behavioral2/memory/3800-0-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/files/0x000900000002313b-13.dat upx behavioral2/memory/3800-17-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/4352-26-0x0000000000500000-0x0000000000510000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3800 wrote to memory of 4352 3800 38d9253de365a8ef1551581ce9a78245.exe 85 PID 3800 wrote to memory of 4352 3800 38d9253de365a8ef1551581ce9a78245.exe 85 PID 3800 wrote to memory of 4352 3800 38d9253de365a8ef1551581ce9a78245.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\38d9253de365a8ef1551581ce9a78245.exe"C:\Users\Admin\AppData\Local\Temp\38d9253de365a8ef1551581ce9a78245.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:4352
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
115KB
MD590c51fc008107a38256602dd9bf8a09d
SHA151dd65cff2cf685d6450eb0d17728781d33e439d
SHA256a38401d859db370dfe49604f43c103961ab69b67c2c3d668405f7d7b8784856a
SHA5125f241b1ab419bfcb55f0c5264044701fd708bd238c7156f773d33e2b8229e84ae368bdf220ee9d7c7a9c15dde1fd65a6609c6e4e19697b77e3431460a8e76239