Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13/02/2024, 03:05
Static task
static1
Behavioral task
behavioral1
Sample
9850fa2456882c05ddd195c79da82346.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9850fa2456882c05ddd195c79da82346.exe
Resource
win10v2004-20231215-en
General
-
Target
9850fa2456882c05ddd195c79da82346.exe
-
Size
55KB
-
MD5
9850fa2456882c05ddd195c79da82346
-
SHA1
627721f9330713f7294d36c5edac4b011a99777c
-
SHA256
f893fac6b6a48c5d27ce5665c1174a3c99dc4ba326e57dce71aa7976f9630ee6
-
SHA512
a15d41a7877d84fdcba09128da8e4503d3ac7d2a4eeea327a6b4d5d95f6a200da71867ebfa2256aafcd9460fc87471239e26fa63882626af2534281acd3bf7fa
-
SSDEEP
768:Oe3PFaDVyOQgljLDKRJyM3BmsHzSB4us/wJJapg4RoSMZeUZB/qmUuu07dgPVO6O:V3cpyORJLuB4P4AJJv4Romu/DUuHBgY
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 9850fa2456882c05ddd195c79da82346.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation 9850fa2456882c05ddd195c79da82346.exe -
Loads dropped DLL 1 IoCs
pid Process 60 9850fa2456882c05ddd195c79da82346.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\ie13\Internat Explorer\Desktop.ini 9850fa2456882c05ddd195c79da82346.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\ie13\Internat Explorer\Desktop.ini 9850fa2456882c05ddd195c79da82346.exe File created C:\Program Files (x86)\Microsoft\ie13\Internat Explorer\target.lnk 9850fa2456882c05ddd195c79da82346.exe File opened for modification C:\Program Files (x86)\Microsoft\ie13\Internat Explorer attrib.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\jgpfile\shell\open\command 9850fa2456882c05ddd195c79da82346.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\jgpfile\shell\open 9850fa2456882c05ddd195c79da82346.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\jgpfile\shell\open\command\ = "explorer \"C:\\Program Files (x86)\\Microsoft\\%*ie%S3\\%2Internat Explorer\"" 9850fa2456882c05ddd195c79da82346.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.jgp 9850fa2456882c05ddd195c79da82346.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.jgp\ = "jgpfile" 9850fa2456882c05ddd195c79da82346.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\jgpfile\DefaultIcon 9850fa2456882c05ddd195c79da82346.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\jgpfile 9850fa2456882c05ddd195c79da82346.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\jgpfile\DefaultIcon\ = "%1" 9850fa2456882c05ddd195c79da82346.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\jgpfile\shell 9850fa2456882c05ddd195c79da82346.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 60 wrote to memory of 4696 60 9850fa2456882c05ddd195c79da82346.exe 85 PID 60 wrote to memory of 4696 60 9850fa2456882c05ddd195c79da82346.exe 85 PID 60 wrote to memory of 4696 60 9850fa2456882c05ddd195c79da82346.exe 85 PID 60 wrote to memory of 1716 60 9850fa2456882c05ddd195c79da82346.exe 88 PID 60 wrote to memory of 1716 60 9850fa2456882c05ddd195c79da82346.exe 88 PID 60 wrote to memory of 1716 60 9850fa2456882c05ddd195c79da82346.exe 88 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 4696 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9850fa2456882c05ddd195c79da82346.exe"C:\Users\Admin\AppData\Local\Temp\9850fa2456882c05ddd195c79da82346.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Checks computer location settings
- Loads dropped DLL
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:60 -
C:\Windows\SysWOW64\attrib.exe"C:\Windows\System32\attrib.exe" "C:\Program Files (x86)\Microsoft\ie13\Internat Explorer" +s2⤵
- Drops file in Program Files directory
- Views/modifies file attributes
PID:4696
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp.bat" "2⤵PID:1716
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD500a0194c20ee912257df53bfe258ee4a
SHA1d7b4e319bc5119024690dc8230b9cc919b1b86b2
SHA256dc4da2ccadb11099076926b02764b2b44ad8f97cd32337421a4cc21a3f5448f3
SHA5123b38a2c17996c3b77ebf7b858a6c37415615e756792132878d8eddbd13cb06710b7da0e8b58104768f8e475fc93e8b44b3b1ab6f70ddf52edee111aaf5ef5667
-
Filesize
186B
MD5bd0a2e589dccc9ed26ef7aa18fb70f5c
SHA1fd780c30a3e143aaf8a23eef50fbbe3239a1983e
SHA25662a211ece64d3bee8d6a5278754b1315d45737613b219bd5eccf182eee256c1d
SHA512a696367051cc65b3ae3240b1f949d95c2d8b6c9089394bee4a536ff5d20e02b25b2b0701c782821d53401a50a005c5269ba8ee69cd4b2303e48be37664b977f4