Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
27/01/2024, 19:24
Static task
static1
Behavioral task
behavioral1
Sample
7b12d55f8d915767b4705c19217391bf.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7b12d55f8d915767b4705c19217391bf.exe
Resource
win10v2004-20231215-en
General
-
Target
7b12d55f8d915767b4705c19217391bf.exe
-
Size
80KB
-
MD5
7b12d55f8d915767b4705c19217391bf
-
SHA1
c193ba3eeb8f68740ececf9ab173e8a0fa8fb3c9
-
SHA256
ec517a971500245dd32fedadb52fab8019f314ec95bb6b954382e99e927b8361
-
SHA512
cb4c422218bbb8f474d89d850bee76729c1fd7e3a63ee733a903b854ac27cc6860630c1cff6d607dd8c715423e17e7e33d0c31fec0f5f8e32594d33063e41665
-
SSDEEP
1536:/rq+QnUkvADmIqqlwdrI0ec6XWjAbi6D7+zvhsA++V1a1kEJ9:BehvZ5uwVI0ecqW5zvhHO1JD
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Control Panel\International\Geo\Nation 7b12d55f8d915767b4705c19217391bf.exe -
Executes dropped EXE 3 IoCs
pid Process 3900 temp.exe 2060 temp2.exe 852 temp.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\aplib.dll temp2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3996 852 WerFault.exe 90 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2060 temp2.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3216 wrote to memory of 3900 3216 7b12d55f8d915767b4705c19217391bf.exe 88 PID 3216 wrote to memory of 3900 3216 7b12d55f8d915767b4705c19217391bf.exe 88 PID 3216 wrote to memory of 3900 3216 7b12d55f8d915767b4705c19217391bf.exe 88 PID 3216 wrote to memory of 2060 3216 7b12d55f8d915767b4705c19217391bf.exe 89 PID 3216 wrote to memory of 2060 3216 7b12d55f8d915767b4705c19217391bf.exe 89 PID 3216 wrote to memory of 2060 3216 7b12d55f8d915767b4705c19217391bf.exe 89 PID 3900 wrote to memory of 852 3900 temp.exe 90 PID 3900 wrote to memory of 852 3900 temp.exe 90 PID 3900 wrote to memory of 852 3900 temp.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\7b12d55f8d915767b4705c19217391bf.exe"C:\Users\Admin\AppData\Local\Temp\7b12d55f8d915767b4705c19217391bf.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Users\Admin\AppData\Local\Temp\temp.exe"C:\Users\Admin\AppData\Local\Temp\temp.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3900 -
C:\Users\Admin\AppData\Local\Temp\temp.exeStubPath3⤵
- Executes dropped EXE
PID:852 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 852 -s 4524⤵
- Program crash
PID:3996
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\temp2.exe"C:\Users\Admin\AppData\Local\Temp\temp2.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:2060
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 852 -ip 8521⤵PID:3080
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD5ccf41b129bb48359adc377adccbf3ce5
SHA17aad76c412578718810c8d65d641708b27bdc180
SHA256641f6b1c97978514a0edaef92d3bd893e1a94ede633b4d3167412fc046271516
SHA512514248f6010ac482fc7fd6a399aab8b4469c099ef0407d77641448ad16d08b881617ba80f553adb0b9d1d1d061faa80e0d78e1ea85755c3d8314c65662448c3f
-
Filesize
28KB
MD502212ea4a2e2a5fff68c8b6df1fe7d71
SHA1e5ae35758b103e9ede7f9e4fd276b4f793a9cc1b
SHA256d140c17117878646fdee80c016e5af89d3eec5330b53674041a2bbe73c8db9cf
SHA512eb66cc1abf1da77ee61609c5d29aca65a51a422f19bdf9abf935e1646ade82dcd24cbe659cf57692110fc90b6feb8ea29dad75109e7604b06e36f43469c42464