Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
04/02/2024, 11:00
Static task
static1
Behavioral task
behavioral1
Sample
8efbbcfb771a2062e0c1c957f3589f8b.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
8efbbcfb771a2062e0c1c957f3589f8b.exe
Resource
win10v2004-20231222-en
General
-
Target
8efbbcfb771a2062e0c1c957f3589f8b.exe
-
Size
159KB
-
MD5
8efbbcfb771a2062e0c1c957f3589f8b
-
SHA1
4a7a431cab162690d984d5dcf352de0e57fb7d8d
-
SHA256
80a97158281ad3a2d4fccc0ca9cb92b16f824d128418f977abb4cc7b098fdd69
-
SHA512
6ed83b4b29c094c7924b0b8ffa9c720166bbf78555200dc58adf58da5255b874b319c412185f26e6205435edfcd47613bb7cedca1654866241b3ae8a87db0324
-
SSDEEP
3072:J7IAwHYNoG5/A3GhSWN0kmMm7gFzYVR3HuFWRHRzPq6vrX9qDe:J8ATXm1LNuFuNnX4D
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 8efbbcfb771a2062e0c1c957f3589f8b.exe -
Executes dropped EXE 1 IoCs
pid Process 3320 rsgyh.exe -
Loads dropped DLL 1 IoCs
pid Process 3320 rsgyh.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
pid Process 4624 taskkill.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4352 PING.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3320 rsgyh.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4624 taskkill.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 3320 rsgyh.exe 3320 rsgyh.exe 3320 rsgyh.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 3320 rsgyh.exe 3320 rsgyh.exe 3320 rsgyh.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 5980 wrote to memory of 3408 5980 8efbbcfb771a2062e0c1c957f3589f8b.exe 89 PID 5980 wrote to memory of 3408 5980 8efbbcfb771a2062e0c1c957f3589f8b.exe 89 PID 5980 wrote to memory of 3408 5980 8efbbcfb771a2062e0c1c957f3589f8b.exe 89 PID 3408 wrote to memory of 4624 3408 cmd.exe 91 PID 3408 wrote to memory of 4624 3408 cmd.exe 91 PID 3408 wrote to memory of 4624 3408 cmd.exe 91 PID 3408 wrote to memory of 4352 3408 cmd.exe 93 PID 3408 wrote to memory of 4352 3408 cmd.exe 93 PID 3408 wrote to memory of 4352 3408 cmd.exe 93 PID 3408 wrote to memory of 3320 3408 cmd.exe 97 PID 3408 wrote to memory of 3320 3408 cmd.exe 97 PID 3408 wrote to memory of 3320 3408 cmd.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\8efbbcfb771a2062e0c1c957f3589f8b.exe"C:\Users\Admin\AppData\Local\Temp\8efbbcfb771a2062e0c1c957f3589f8b.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5980 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /f /pid 5980 & ping -n 3 127.1 & del /f /q "C:\Users\Admin\AppData\Local\Temp\8efbbcfb771a2062e0c1c957f3589f8b.exe" & start C:\Users\Admin\AppData\Local\rsgyh.exe -f2⤵
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /pid 59803⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4624
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 127.13⤵
- Runs ping.exe
PID:4352
-
-
C:\Users\Admin\AppData\Local\rsgyh.exeC:\Users\Admin\AppData\Local\rsgyh.exe -f3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3320
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
159KB
MD58efbbcfb771a2062e0c1c957f3589f8b
SHA14a7a431cab162690d984d5dcf352de0e57fb7d8d
SHA25680a97158281ad3a2d4fccc0ca9cb92b16f824d128418f977abb4cc7b098fdd69
SHA5126ed83b4b29c094c7924b0b8ffa9c720166bbf78555200dc58adf58da5255b874b319c412185f26e6205435edfcd47613bb7cedca1654866241b3ae8a87db0324