Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
131s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
24/02/2024, 03:18
Static task
static1
Behavioral task
behavioral1
Sample
b5b3629c10745e79689666366f185217.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b5b3629c10745e79689666366f185217.exe
Resource
win10v2004-20240221-en
General
-
Target
b5b3629c10745e79689666366f185217.exe
-
Size
125KB
-
MD5
b5b3629c10745e79689666366f185217
-
SHA1
90ebaf57008f4d825f303df1a4e27f5c30d861f3
-
SHA256
34f19a642ac2f4149835f8ba35afd3869ee0caca299759b8cef9cad9c6a26f3b
-
SHA512
f9412d801a304cac9731e35154e151703f5b223bf754c3b8e6b998d83e594ab3d9b948d8d1ddbae87c652730b050421c9b56e86385e43dca1054e3109354e741
-
SSDEEP
1536:gUj+AIMOtEvwDpjNbwQEIPlemUhYwkkxGBxZ:vCA9OtEvwDpjN
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2828415587-3732861812-1919322417-1000\Control Panel\International\Geo\Nation b5b3629c10745e79689666366f185217.exe -
Executes dropped EXE 1 IoCs
pid Process 4420 misid.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4628 wrote to memory of 4420 4628 b5b3629c10745e79689666366f185217.exe 89 PID 4628 wrote to memory of 4420 4628 b5b3629c10745e79689666366f185217.exe 89 PID 4628 wrote to memory of 4420 4628 b5b3629c10745e79689666366f185217.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\b5b3629c10745e79689666366f185217.exe"C:\Users\Admin\AppData\Local\Temp\b5b3629c10745e79689666366f185217.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:4420
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
126KB
MD5485be6bd54b95416a67de4bea7e69c12
SHA1c9ca79eea2c35a4a36810b54f2c9fcbfe354baab
SHA256583617b501f74fe61b7e844d61845e6fb2677a3eee985bf7c99cdd3166a53cf8
SHA5129d6d5f8f5154af1d7d3e8be6f5912d4af647d70e10467b525384b453a503781d1746e4735c88f7c83634fd0eeb6fe56055d469aecce621c09df527b0f2195f7f