Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12/02/2024, 01:57
Static task
static1
Behavioral task
behavioral1
Sample
605baf6490c8824e59b10134dd0461c9caecac5cfd2a086be3e98682caf49a86.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
605baf6490c8824e59b10134dd0461c9caecac5cfd2a086be3e98682caf49a86.exe
Resource
win10v2004-20231215-en
General
-
Target
605baf6490c8824e59b10134dd0461c9caecac5cfd2a086be3e98682caf49a86.exe
-
Size
2.0MB
-
MD5
3fa079ca6ec1e8d9d1baf7b584600114
-
SHA1
8eaaafdc7520daefcd973ffc5b33fb861d703e97
-
SHA256
605baf6490c8824e59b10134dd0461c9caecac5cfd2a086be3e98682caf49a86
-
SHA512
f9039341d2a81b7c108dc260e27aedfd3fc9f73ba24f0ecd39a354fddb06c11232cd92464db294cffa7115589cb8f936147b841bda87fcd1e27efaf35f5618e2
-
SSDEEP
49152:1monDZqrSFkUrvblEIXwOJ9LGME8Ssv6qPajeEhsZ:1movjmuLd1W78
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Control Panel\International\Geo\Nation 605baf6490c8824e59b10134dd0461c9caecac5cfd2a086be3e98682caf49a86.exe -
Loads dropped DLL 1 IoCs
pid Process 404 regsvr32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1272 wrote to memory of 404 1272 605baf6490c8824e59b10134dd0461c9caecac5cfd2a086be3e98682caf49a86.exe 84 PID 1272 wrote to memory of 404 1272 605baf6490c8824e59b10134dd0461c9caecac5cfd2a086be3e98682caf49a86.exe 84 PID 1272 wrote to memory of 404 1272 605baf6490c8824e59b10134dd0461c9caecac5cfd2a086be3e98682caf49a86.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\605baf6490c8824e59b10134dd0461c9caecac5cfd2a086be3e98682caf49a86.exe"C:\Users\Admin\AppData\Local\Temp\605baf6490c8824e59b10134dd0461c9caecac5cfd2a086be3e98682caf49a86.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" -s .\BKI5BV.l2⤵
- Loads dropped DLL
PID:404
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD5ea748288db2906487b74e6c77e2d23a7
SHA136655321be1e1bacf37a64520c7b72c9590e1c0d
SHA25679911093475acc80f8967bc92391f716297d153a3ae2604efbd2d6c0b7a0fa0d
SHA51227f292338a37a774392d7d5b7a38bd20370a68b3967b1af6950c974a0abf4822291329a77c64494b859caa3c8e0fe53d9a2ccb207a8931989739eed614c85a6f