Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
25/02/2024, 17:24
Static task
static1
Behavioral task
behavioral1
Sample
a45c59379ddcfccedbfec76aeb368681.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a45c59379ddcfccedbfec76aeb368681.exe
Resource
win10v2004-20240221-en
General
-
Target
a45c59379ddcfccedbfec76aeb368681.exe
-
Size
1.3MB
-
MD5
a45c59379ddcfccedbfec76aeb368681
-
SHA1
f635f70561d0d0be947026b622948b507d7907d3
-
SHA256
f4ad629055c4cf7c41ca7d5c3f7fc2bfaebd25fa9b7d60ec696a54bfcb2b5b57
-
SHA512
8789ca5173352ea27572f7bf731dbc2d3bd35bd2726a3eb467d23ae84cf7ea1d507567e0f7694baa1c0217241ea50b29d49ea4b4ee7bf39690028ec50747c405
-
SSDEEP
24576:o20gPgFKWoaHn/FhsBMkuBG2imJGSz7kK5klpOjixxIb5mR/drHjH+bM:5KOasekuBG2TGSXkatjux/drjHN
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3844919115-497234255-166257750-1000\Control Panel\International\Geo\Nation a45c59379ddcfccedbfec76aeb368681.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4524 wrote to memory of 4376 4524 a45c59379ddcfccedbfec76aeb368681.exe 86 PID 4524 wrote to memory of 4376 4524 a45c59379ddcfccedbfec76aeb368681.exe 86 PID 4524 wrote to memory of 4376 4524 a45c59379ddcfccedbfec76aeb368681.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\a45c59379ddcfccedbfec76aeb368681.exe"C:\Users\Admin\AppData\Local\Temp\a45c59379ddcfccedbfec76aeb368681.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" KpFDV.GQ LZRpwQKgt2⤵PID:4376
-