Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/01/2024, 18:01
Behavioral task
behavioral1
Sample
72aece57191774ee8faa706df2fb668f.exe
Resource
win7-20231215-en
General
-
Target
72aece57191774ee8faa706df2fb668f.exe
-
Size
401KB
-
MD5
72aece57191774ee8faa706df2fb668f
-
SHA1
0a397db178732b4d0e3e1ca8567ab8f08de89b93
-
SHA256
665c0f4b784ab387fba7f945059dad5b8462b0ccffa96f2110ea673dabdd2044
-
SHA512
6c547649fb3058cfbea61cd05df8f9ad222abb1213687f9f2d5ac7dad10f05c0c7b6bf2f4edd50b181b2cfe17c663a99e3fcc5d215e7e803334d9592d1af8bfa
-
SSDEEP
6144:85SXvBoDWoyLYyzbkPC4DYM6SB6v+qLnAzYmhwrxcvkzmSBrohW:8IfBoDWoyFblU6hAJQnO0
Malware Config
Extracted
urelas
218.54.31.165
218.54.31.226
Signatures
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Control Panel\International\Geo\Nation aqmoc.exe Key value queried \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Control Panel\International\Geo\Nation tifiiz.exe Key value queried \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Control Panel\International\Geo\Nation 72aece57191774ee8faa706df2fb668f.exe -
Executes dropped EXE 3 IoCs
pid Process 3104 aqmoc.exe 4016 tifiiz.exe 2296 suvoj.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2296 suvoj.exe 2296 suvoj.exe 2296 suvoj.exe 2296 suvoj.exe 2296 suvoj.exe 2296 suvoj.exe 2296 suvoj.exe 2296 suvoj.exe 2296 suvoj.exe 2296 suvoj.exe 2296 suvoj.exe 2296 suvoj.exe 2296 suvoj.exe 2296 suvoj.exe 2296 suvoj.exe 2296 suvoj.exe 2296 suvoj.exe 2296 suvoj.exe 2296 suvoj.exe 2296 suvoj.exe 2296 suvoj.exe 2296 suvoj.exe 2296 suvoj.exe 2296 suvoj.exe 2296 suvoj.exe 2296 suvoj.exe 2296 suvoj.exe 2296 suvoj.exe 2296 suvoj.exe 2296 suvoj.exe 2296 suvoj.exe 2296 suvoj.exe 2296 suvoj.exe 2296 suvoj.exe 2296 suvoj.exe 2296 suvoj.exe 2296 suvoj.exe 2296 suvoj.exe 2296 suvoj.exe 2296 suvoj.exe 2296 suvoj.exe 2296 suvoj.exe 2296 suvoj.exe 2296 suvoj.exe 2296 suvoj.exe 2296 suvoj.exe 2296 suvoj.exe 2296 suvoj.exe 2296 suvoj.exe 2296 suvoj.exe 2296 suvoj.exe 2296 suvoj.exe 2296 suvoj.exe 2296 suvoj.exe 2296 suvoj.exe 2296 suvoj.exe 2296 suvoj.exe 2296 suvoj.exe 2296 suvoj.exe 2296 suvoj.exe 2296 suvoj.exe 2296 suvoj.exe 2296 suvoj.exe 2296 suvoj.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4520 wrote to memory of 3104 4520 72aece57191774ee8faa706df2fb668f.exe 88 PID 4520 wrote to memory of 3104 4520 72aece57191774ee8faa706df2fb668f.exe 88 PID 4520 wrote to memory of 3104 4520 72aece57191774ee8faa706df2fb668f.exe 88 PID 4520 wrote to memory of 2112 4520 72aece57191774ee8faa706df2fb668f.exe 89 PID 4520 wrote to memory of 2112 4520 72aece57191774ee8faa706df2fb668f.exe 89 PID 4520 wrote to memory of 2112 4520 72aece57191774ee8faa706df2fb668f.exe 89 PID 3104 wrote to memory of 4016 3104 aqmoc.exe 91 PID 3104 wrote to memory of 4016 3104 aqmoc.exe 91 PID 3104 wrote to memory of 4016 3104 aqmoc.exe 91 PID 4016 wrote to memory of 2296 4016 tifiiz.exe 100 PID 4016 wrote to memory of 2296 4016 tifiiz.exe 100 PID 4016 wrote to memory of 2296 4016 tifiiz.exe 100 PID 4016 wrote to memory of 548 4016 tifiiz.exe 101 PID 4016 wrote to memory of 548 4016 tifiiz.exe 101 PID 4016 wrote to memory of 548 4016 tifiiz.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\72aece57191774ee8faa706df2fb668f.exe"C:\Users\Admin\AppData\Local\Temp\72aece57191774ee8faa706df2fb668f.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Users\Admin\AppData\Local\Temp\aqmoc.exe"C:\Users\Admin\AppData\Local\Temp\aqmoc.exe" hi2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\Users\Admin\AppData\Local\Temp\tifiiz.exe"C:\Users\Admin\AppData\Local\Temp\tifiiz.exe" OK3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Users\Admin\AppData\Local\Temp\suvoj.exe"C:\Users\Admin\AppData\Local\Temp\suvoj.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2296
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "4⤵PID:548
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "2⤵PID:2112
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224B
MD5c4e4e58d5f5c90304745243e46437cac
SHA196fc8b086aeae83faae2b968f6312e12e49bf3b3
SHA25631c99508b93cdeefd52a537dd264d33eccc990ec2ea0ea3e5e027da41c09a109
SHA51239daa8bdc5318b2a50dba3ae95df56e7366eaa05f1d68073f261370d39cb1c1096e6881b87e1dacf5cdcb65a85d4c97acc030be30eda4281c078393e12b38237
-
Filesize
276B
MD55c66acc43ae456f356e617467702c56c
SHA1dcd24c79cb78e0dd2f31c6ccc2b1f9ac07f8b270
SHA256aba1fc6cdc0fd31e39bb693c40604a46683e6c2c41457b9f7f476e7a7d376abc
SHA51264284e7b2b9e7c96cce097d208ef4461a943945a75b0869e4c3158b1c8bfeecb7a1364e3b3599edef77fb04bbec690d0efafa7f064ce846d64c0116172557ac4
-
Filesize
401KB
MD5e958995ce2939e1ae5976d44acadb7e3
SHA1bf5f578721cb17546aa1829d1181f385186e1722
SHA256455091c0704a94d11aa46acd6f4e0d47c65be4b798a8fa6c65e33b550200cef4
SHA51224c87aac42ff833ef177e7f87e3e5796c6123bd1ebe48389e1275d7611129e266e2882d1741e0a0850ac0aae9a3bcc22c1d869146671ded691c1958e2463d0cf
-
Filesize
393KB
MD5b4f5ea77b6cab9c95581e53a4524e358
SHA1bb177f3a86c65859d75a0a89f5c0e044909ce7f9
SHA256d8a68662bc949f2a5d8dc678fb3d01f4ee7be02392e1748f86fe44a2f0153dc5
SHA512667dcf3cdcc9a95f8ec073b77a604e6d4c73409264fa8e98894e40f6fcaf80d01540a5b3bdfdc096c53e444596f000fd1c58687278dc14e4719bcd0b2d5d92a3
-
Filesize
512B
MD51be2393acab076664557df67fb185bfc
SHA1285c3ff592b66dca3a468e339d0cd0842140765f
SHA25664add18c2e05b0d4ebe5d0af0098bd1859fa3eeb8ae7c5c71fcc9261741b1f12
SHA512da2b7d001b751c2563029710303f53a61b6e763d443322abc915129628c52b5dff1e93d685cc8338ae84ccb8ff043dc673faae13d9818638783a86d4785997e0
-
Filesize
223KB
MD5aeb14970c17cb1eb85889b92cb9fd402
SHA113d2d92ca393e388c692d4517457bce310789573
SHA256eef5175d3e3738201fa885d1d5f165eedab138f02dc8fcd25fa5b4e1695d594c
SHA5122928ab4df30a2fd19878c634184ba616af28fb0b6ab837e2728e4af547e2110cd1db5266f73992da3d43f1cfa67bf7c4fe9df21481e33b309dc15b295292f4fa
-
Filesize
401KB
MD575de1edc4c9ade2f088457481b386775
SHA13c193475ea24d8bb9aba206e576d7ef849c6e3f4
SHA256a83288e301c3c1be90df365762efd7237f324c20cf5b72b30b275b120e5e4950
SHA5120aa5ddcd7eac6b2d16dee1a510a4a33d44f9722b302f57cc5e6cba862aecc6a2c16e29d376e92d9df73fc6f863377b8d497b2df3fbd330e8c70decc22e59832f