Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/02/2024, 17:43

General

  • Target

    a25c9e0db567e8860dd5b44bb1f78696.exe

  • Size

    1.6MB

  • MD5

    a25c9e0db567e8860dd5b44bb1f78696

  • SHA1

    2b074514d036c658e181c4ceb33726e83eadee85

  • SHA256

    85c68afc84f2ff1b282b12c64c10f559c8de22a3e46b8cd03d09f95fb82f3a18

  • SHA512

    739a17492a14d9a0573bb885e475290f04382011f0eb5d495bc682b9a7781d59bb1ae0256594974f5cd97652b2af82aeda75cc84d4d99a70500aca198ece3363

  • SSDEEP

    49152:/Zgu8rAi+3USz3h1/XBkThdTlpSuxQxN9dT4S9E:/GIjR1Oh0To

Score
5/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a25c9e0db567e8860dd5b44bb1f78696.exe
    "C:\Users\Admin\AppData\Local\Temp\a25c9e0db567e8860dd5b44bb1f78696.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4904
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\15523.bat" "C:\Users\Admin\AppData\Local\Temp\F30E8FBB70D941B088FAA5A00A4ED621\""
      2⤵
        PID:1988

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\15523.bat

      Filesize

      212B

      MD5

      668767f1e0c7ff2b3960447e259e9f00

      SHA1

      32d8abf834cce72f5e845175a0af2513b00504d8

      SHA256

      cdb93994093a24991c246d8b6f7003920a510a45bfc8441521314ce22a79191d

      SHA512

      c07f26c8601cf91d9805004668463721ab91e14f3cc59e77e20f43d98e070ea8e742c38fe8021c4ffb1ebc02e3743ab732b66ff84bb24b59a5fdcc8634c77680

    • C:\Users\Admin\AppData\Local\Temp\F30E8FBB70D941B088FAA5A00A4ED621\F30E8FBB70D941B088FAA5A00A4ED621_LogFile.txt

      Filesize

      1KB

      MD5

      049978273e6b48b177de2b8c46b0998d

      SHA1

      5e1341852d76cabb45b05269ab72d27adbd9d8e5

      SHA256

      e0876d41a63720e439c8dd1eedfefa8ab035a40d214e82ec8260bf763b133527

      SHA512

      be3b55096e7e63f7040ebbcf5f7a2b34c77c5d10c5736cc13ed89f67a941dff2abe03730bab3ef89445a6512bbca0b602bdf5785bb3c1eab559eb2cbd102c212

    • C:\Users\Admin\AppData\Local\Temp\F30E8FBB70D941B088FAA5A00A4ED621\F30E8FBB70D941B088FAA5A00A4ED621_LogFile.txt

      Filesize

      771B

      MD5

      7ead2e1027afb91dd04b040dbb80bd30

      SHA1

      669b71cb3914915a5969f62ee9ed07813abd3cdb

      SHA256

      1951dc1e4a2a1e41a6860ecbce0758e42e05d9b3c3c0b3a7a09fb235639fe4ed

      SHA512

      67964586ab0b6ff4c0c0eaa7761e4e895bb1e89056801d9419eec41cfd25418c200e84272f26f9c193ce489b86d06971b7155c3f2ad8d4dab32671849ac80925

    • C:\Users\Admin\AppData\Local\Temp\F30E8FBB70D941B088FAA5A00A4ED621\F30E8FBB70D941B088FAA5A00A4ED621_LogFile.txt

      Filesize

      2KB

      MD5

      c9b970a2c117d360fb5731d996fdee28

      SHA1

      fe4f22de867d2766d23f6d0e9f5b10be7a6a3147

      SHA256

      894424a0e5e58dea4296e91a71236b521524c7b790ff760ffddbda6bbc7b1343

      SHA512

      ef0dd84ee78eed9c1aa9a817edde5df8351d94f13dab6240a6ed98dace57355168fed73823aec16b628663fd1b1828821f8f2d38054421a2d650fa167d337fa0

    • C:\Users\Admin\AppData\Local\Temp\F30E8FBB70D941B088FAA5A00A4ED621\F30E8FBB70D941B088FAA5A00A4ED621_LogFile.txt

      Filesize

      5KB

      MD5

      a2ce997932278c49a7ac9782ab63be10

      SHA1

      8fe5d72178bc88161464165c1277f3ae80eb02c6

      SHA256

      b05d89e69d2a6c799b486289f90f6d294f418bd67855a3164fbf527a22dee3ab

      SHA512

      21dbb8831ecf0c49f06023f2a862ab8d1cd1f6bf5fdfce4964327878013b47cc5f586aa48241ffbbca123adcfcc12b8ad517a517ac3618f2427752ab1b40d9b5

    • C:\Users\Admin\AppData\Local\Temp\F30E8FBB70D941B088FAA5A00A4ED621\F30E8F~1.TXT

      Filesize

      102KB

      MD5

      5ee972cf825bed599f66c2b7a1146f8d

      SHA1

      79aaa9ab6a2c57b54f1e35e13cf4c7093bb25215

      SHA256

      4a2608df696eba5407c44cd9070934d564c59d6d1a88179c27f711145d8141f3

      SHA512

      3b508e637d7da99bd250b6883a2f48010bd1130914b1c2e1e286dced79318a0e20a1fb2ed2976b8c2f2cc125484befc48f5c6ca85f9dedaf084937b6a36c9329

    • memory/4904-63-0x0000000004120000-0x0000000004121000-memory.dmp

      Filesize

      4KB