Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
27/01/2024, 00:17
Static task
static1
Behavioral task
behavioral1
Sample
78c68612c91f659aba2f353ee9be8d4d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
78c68612c91f659aba2f353ee9be8d4d.exe
Resource
win10v2004-20231222-en
General
-
Target
78c68612c91f659aba2f353ee9be8d4d.exe
-
Size
142KB
-
MD5
78c68612c91f659aba2f353ee9be8d4d
-
SHA1
8b541e06d8020cfe0e7193fb4e2c01b9a063a8ea
-
SHA256
2062cec7ae097ed057248c74fce3c5ca9111a8ac46ec3620f3f0f27abc78a9ff
-
SHA512
78c21ff07642f52ec4594de353588ce8e47cff22e4049203254810de7a9c94f1e70af2b08cafeccdd3d898e4307d17cce8c15bc7a756647d500144303f2f44f4
-
SSDEEP
3072:z7227BlmdTT5uXHCeLju1t41K6uO/lDPkyjpGEJ:v7fmdTU3CW44lDcyQEJ
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation 78c68612c91f659aba2f353ee9be8d4d.exe -
Executes dropped EXE 1 IoCs
pid Process 4868 40f11295.exe -
Loads dropped DLL 1 IoCs
pid Process 4868 40f11295.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\509bb52b.dll 78c68612c91f659aba2f353ee9be8d4d.exe File opened for modification C:\Windows\SysWOW64\509bb52b.dll 78c68612c91f659aba2f353ee9be8d4d.exe File created C:\Windows\SysWOW64\BASSMOD.dll 40f11295.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 3456 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3456 AUDIODG.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4508 wrote to memory of 4868 4508 78c68612c91f659aba2f353ee9be8d4d.exe 89 PID 4508 wrote to memory of 4868 4508 78c68612c91f659aba2f353ee9be8d4d.exe 89 PID 4508 wrote to memory of 4868 4508 78c68612c91f659aba2f353ee9be8d4d.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\78c68612c91f659aba2f353ee9be8d4d.exe"C:\Users\Admin\AppData\Local\Temp\78c68612c91f659aba2f353ee9be8d4d.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Users\Admin\AppData\Local\Temp\40f11295.exe"C:\Users\Admin\AppData\Local\Temp\40f11295.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:4868
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x41c 0x48c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3456
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD5d9dbeac7f4760554f51504b9b308976e
SHA1ea12a7ce3929e0bc088da2dc58e50860cab1acc6
SHA256844747f8c2b141ed12c2dcb3a8ccf3aa2f7f0aa108bbfdfbcdd82d4909ca2bd0
SHA5129bdd4aa81c96c695f1314904fc3124ce1ac53f1674e4a60f696c18e907117dc21f27e07dde90301b60975eb4a3689416d904d91d6e638b7342aa06a9fb2fed3c
-
Filesize
15KB
MD5048c336274723710201a3ab5ce7af260
SHA1c72d1d72b9cc49e11fa3d2cd3d9366bc9be19277
SHA256454deb7962edbeb3260decec8b51a8c2febb9226ebaf627859c02f455af5bcd3
SHA512acd01168b04dd528f583239cc9b2ddf6411a74da0da8e4ab332a8d03cd32381cbf8931e13e027f4a69c0a1a4abe8472f163d33f03b22b76df7d2ef66ad9c7c95