Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
91s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
03/02/2024, 10:25
Static task
static1
Behavioral task
behavioral1
Sample
8c185cf9508f95225c893b7cf7bde9c3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8c185cf9508f95225c893b7cf7bde9c3.exe
Resource
win10v2004-20231215-en
General
-
Target
8c185cf9508f95225c893b7cf7bde9c3.exe
-
Size
53KB
-
MD5
8c185cf9508f95225c893b7cf7bde9c3
-
SHA1
7e5488c6b056575eca900476ac195f3f00d31223
-
SHA256
7a6abfd5cfb24c055f24ab8da11e8149196cf81250a1d9a12ab435c9a42863ae
-
SHA512
a91dae06f3f922abb880f613f7b0d70758bbec53c4165da8756b286eea2a19af0563e94140385b0f7d499d517ece3ff2a851e013cbd246b0b239609fe8a98bed
-
SSDEEP
768:uJChTypVTFylNCQKowZS4E6SynTruH712N3b4wFBOV1mJt6oRZPJW2q5Q/2wRE:uAhTyTTFQNC13U4rtnDb4tmJ8AJq4S
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\Control Panel\International\Geo\Nation 8c185cf9508f95225c893b7cf7bde9c3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings 8c185cf9508f95225c893b7cf7bde9c3.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 208 wrote to memory of 2508 208 8c185cf9508f95225c893b7cf7bde9c3.exe 84 PID 208 wrote to memory of 2508 208 8c185cf9508f95225c893b7cf7bde9c3.exe 84 PID 208 wrote to memory of 2508 208 8c185cf9508f95225c893b7cf7bde9c3.exe 84 PID 208 wrote to memory of 4860 208 8c185cf9508f95225c893b7cf7bde9c3.exe 85 PID 208 wrote to memory of 4860 208 8c185cf9508f95225c893b7cf7bde9c3.exe 85 PID 208 wrote to memory of 4860 208 8c185cf9508f95225c893b7cf7bde9c3.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c185cf9508f95225c893b7cf7bde9c3.exe"C:\Users\Admin\AppData\Local\Temp\8c185cf9508f95225c893b7cf7bde9c3.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\newsetup.vbs"2⤵PID:2508
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\1.vbs"2⤵PID:4860
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
651B
MD54736e7158c27f244482f5a614b9dbdae
SHA1d3a0e95a81e9e3ec95cfd596b25749a0e24e27b9
SHA256b8229bc8d6b0013858fb9599cb510afa4566a439164b2c7444c449540a124acc
SHA512cebf895dd3ec3822c42b78bac49c685b063cb5afcbcfb3850b073cb118d086c5fa75ec50b6e73d90e14f2c6b595752ad87910b8cf27378424d72a9ea309bf824