Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
88s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
04/02/2024, 10:05
Static task
static1
Behavioral task
behavioral1
Sample
8edfe12e2544e6a9687ab9f0b0aaaa74.exe
Resource
win7-20231129-en
General
-
Target
8edfe12e2544e6a9687ab9f0b0aaaa74.exe
-
Size
158KB
-
MD5
8edfe12e2544e6a9687ab9f0b0aaaa74
-
SHA1
03db1451090c15bc733075a7635f56dfce71552f
-
SHA256
400cac203dca17cb0d78bb5b5b44b14c72f1929aa767644f745a2375d48843e5
-
SHA512
795c5ebb51c6d935d49618f4e97f531bc3999b3fd54aee615303ded77ab2f065fd964441b26b3a8dd06a17c7cf8b7ef72105a96130214cda9a67428dcebe2b0b
-
SSDEEP
3072:tbUEaIO/ZDa+4ejeiFZu/X8rfYrXeLiwJM:tbUEa/DaQjPDYreNJM
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation 8edfe12e2544e6a9687ab9f0b0aaaa74.exe -
Executes dropped EXE 2 IoCs
pid Process 1516 server.exe 3468 server.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3056 set thread context of 3328 3056 8edfe12e2544e6a9687ab9f0b0aaaa74.exe 86 PID 1516 set thread context of 3468 1516 server.exe 96 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 4628 timeout.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3468 server.exe 3468 server.exe 3468 server.exe 3468 server.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3056 8edfe12e2544e6a9687ab9f0b0aaaa74.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 3056 wrote to memory of 3328 3056 8edfe12e2544e6a9687ab9f0b0aaaa74.exe 86 PID 3056 wrote to memory of 3328 3056 8edfe12e2544e6a9687ab9f0b0aaaa74.exe 86 PID 3056 wrote to memory of 3328 3056 8edfe12e2544e6a9687ab9f0b0aaaa74.exe 86 PID 3056 wrote to memory of 3328 3056 8edfe12e2544e6a9687ab9f0b0aaaa74.exe 86 PID 3056 wrote to memory of 3328 3056 8edfe12e2544e6a9687ab9f0b0aaaa74.exe 86 PID 3056 wrote to memory of 3328 3056 8edfe12e2544e6a9687ab9f0b0aaaa74.exe 86 PID 3056 wrote to memory of 3328 3056 8edfe12e2544e6a9687ab9f0b0aaaa74.exe 86 PID 3056 wrote to memory of 3328 3056 8edfe12e2544e6a9687ab9f0b0aaaa74.exe 86 PID 3056 wrote to memory of 3328 3056 8edfe12e2544e6a9687ab9f0b0aaaa74.exe 86 PID 3328 wrote to memory of 1516 3328 8edfe12e2544e6a9687ab9f0b0aaaa74.exe 88 PID 3328 wrote to memory of 1516 3328 8edfe12e2544e6a9687ab9f0b0aaaa74.exe 88 PID 3328 wrote to memory of 1516 3328 8edfe12e2544e6a9687ab9f0b0aaaa74.exe 88 PID 3328 wrote to memory of 2964 3328 8edfe12e2544e6a9687ab9f0b0aaaa74.exe 89 PID 3328 wrote to memory of 2964 3328 8edfe12e2544e6a9687ab9f0b0aaaa74.exe 89 PID 3328 wrote to memory of 2964 3328 8edfe12e2544e6a9687ab9f0b0aaaa74.exe 89 PID 2964 wrote to memory of 4628 2964 cmd.exe 92 PID 2964 wrote to memory of 4628 2964 cmd.exe 92 PID 2964 wrote to memory of 4628 2964 cmd.exe 92 PID 1516 wrote to memory of 3468 1516 server.exe 96 PID 1516 wrote to memory of 3468 1516 server.exe 96 PID 1516 wrote to memory of 3468 1516 server.exe 96 PID 1516 wrote to memory of 3468 1516 server.exe 96 PID 1516 wrote to memory of 3468 1516 server.exe 96 PID 3468 wrote to memory of 3424 3468 server.exe 79 PID 3468 wrote to memory of 3424 3468 server.exe 79 PID 3468 wrote to memory of 3424 3468 server.exe 79 PID 3468 wrote to memory of 3424 3468 server.exe 79
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3424
-
C:\Users\Admin\AppData\Local\Temp\8edfe12e2544e6a9687ab9f0b0aaaa74.exe"C:\Users\Admin\AppData\Local\Temp\8edfe12e2544e6a9687ab9f0b0aaaa74.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Users\Admin\AppData\Local\Temp\8edfe12e2544e6a9687ab9f0b0aaaa74.exe
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3328 -
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\server.exeC:\Users\Admin\AppData\Local\Temp\server.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3468
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 5 && del C:\Users\Admin\AppData\Local\Temp\8EDFE1~1.EXE4⤵
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Windows\SysWOW64\timeout.exetimeout 55⤵
- Delays execution with timeout.exe
PID:4628
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD58641236ed4fc87165f0ea56deed5d451
SHA1c7ea56bfae8f7ae22255af8880a3be9ccdb45736
SHA256c5a781c5895bcbdfa3e6300a51437af03c6eedfd853a5f856d9e2a3ff74356cb
SHA512fbaa13fec898f5154e352a402903c49242ac035fea4f77a11a58fe802d391bc7321f74152e0a4ec71536b7f3c1bf03040ef32ec92cbaa413e5da93e034836a9b