Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    91s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/02/2024, 21:12

General

  • Target

    8a8b27cd30eca23ce2f317522db415ee.exe

  • Size

    234KB

  • MD5

    8a8b27cd30eca23ce2f317522db415ee

  • SHA1

    23beb661ebe0fcb4a670220e2de75c916170b88a

  • SHA256

    dc1cd6e7cb3b717a9f4958777cbab775ec118cb2b326191d655c455f2bfc2169

  • SHA512

    7cd95ec1f932846a8cdf3ce60b11b4d5b37b3f239ff99210c5356c9b78737b82f2b54e37c41d22a22aebe0414f1fc1db4f67fac29d8a6653bf63a352e65deb18

  • SSDEEP

    6144:o68i3odBiTl2+TCU/89/tkqxrqLckP+xR:TNodBiTI+TpQ/DrVkP+xR

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 12 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8a8b27cd30eca23ce2f317522db415ee.exe
    "C:\Users\Admin\AppData\Local\Temp\8a8b27cd30eca23ce2f317522db415ee.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2704
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Windows\bugMAKER.bat
      2⤵
      • Checks computer location settings
      • Suspicious use of SetWindowsHookEx
      PID:1748

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\bugMAKER.bat

    Filesize

    76B

    MD5

    e94914bcf5c8e680b4ff075485c5603d

    SHA1

    c7ffcad96dc16a2b0cbfaf8310ea086a8814d1d0

    SHA256

    317239c5c187c6d80fcbc3aea5e586328f164f05a000c0f4c6b1541e6e24bdff

    SHA512

    cd15c279c1ed2eb33b63f199b3894f9dbccb78a1d4478e3448316638cea6dec05b76c25e24682734a24b60efde9d1d24be4befae3cba2d810bcb36f5a9968cb1

  • memory/2704-24-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB