Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
14/02/2024, 03:39
Static task
static1
Behavioral task
behavioral1
Sample
e3e628ebea9019f1c91bb4c0c65ce2a8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
e3e628ebea9019f1c91bb4c0c65ce2a8.exe
Resource
win10v2004-20231215-en
General
-
Target
e3e628ebea9019f1c91bb4c0c65ce2a8.exe
-
Size
34KB
-
MD5
e3e628ebea9019f1c91bb4c0c65ce2a8
-
SHA1
15c20b7288427b021ae500addac42ba4bb38a4dd
-
SHA256
172e5cb8d2b50d3484086903e8f34ffff8b2ce464bc9075ca7e33ed17972ce70
-
SHA512
dc98f2ae21e9e1aa7c0799be7ae2b00a587a7c5add7fe51b42e81875f46affce4fddb8562a9f6e92adb3c0c66aaccf5fe847f17e9c993723cdb55da5fb253f79
-
SSDEEP
384:bM7Q0pjC4GybxMv01d3AcASBQMf6i/zzzcYgUPSznHzu02lOQAY6:b/yC4GyNM01GuQMNXw2PSjHC02ltAY6
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation e3e628ebea9019f1c91bb4c0c65ce2a8.exe -
Executes dropped EXE 1 IoCs
pid Process 3560 retln.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3148 wrote to memory of 3560 3148 e3e628ebea9019f1c91bb4c0c65ce2a8.exe 84 PID 3148 wrote to memory of 3560 3148 e3e628ebea9019f1c91bb4c0c65ce2a8.exe 84 PID 3148 wrote to memory of 3560 3148 e3e628ebea9019f1c91bb4c0c65ce2a8.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\e3e628ebea9019f1c91bb4c0c65ce2a8.exe"C:\Users\Admin\AppData\Local\Temp\e3e628ebea9019f1c91bb4c0c65ce2a8.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Users\Admin\AppData\Local\Temp\retln.exe"C:\Users\Admin\AppData\Local\Temp\retln.exe"2⤵
- Executes dropped EXE
PID:3560
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD59da2dd78bc45df15f99c1f080992a01d
SHA1b6e24f484ad766e129f49033370a2aee8d0c6cd9
SHA256cb30ac5a6fdcf3fc253565b34f7be3068987ad4e617f6f6a074822ba224bc4ec
SHA512795d410edac7c853b3104e425a0e9b21b580a1d4c0344273d34002a912c02605217a5360b8a07b35099670286486625968f3a83d6579e4edba3f5e925a9e235c