Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29/02/2024, 06:28
Static task
static1
Behavioral task
behavioral1
Sample
ade7fe5e1aa0c17e60f017e9da6c7b31.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ade7fe5e1aa0c17e60f017e9da6c7b31.exe
Resource
win10v2004-20240226-en
General
-
Target
ade7fe5e1aa0c17e60f017e9da6c7b31.exe
-
Size
251KB
-
MD5
ade7fe5e1aa0c17e60f017e9da6c7b31
-
SHA1
ed7360260f6ff190ce2a516eccd78cf136579261
-
SHA256
360aad6b7fa946144004afe952dc56b2035962cdbf2a2aff64f145ad674229dc
-
SHA512
74c67843a16657a81071c0fa74875a6af59ca2f7b42c75a100725a8f077bd405127f3e318c0389a26246eed10853ff385d8c7d110dae04dc0790393a3e59b729
-
SSDEEP
3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/e8dkgnYHfQlAk:o68i3odBiTl2+TCU/Hk8KfQlEeT
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\Control Panel\International\Geo\Nation cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft I Service = "C:\\Windows\\winhash_up.exe /REGstart" ade7fe5e1aa0c17e60f017e9da6c7b31.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\SHARE_TEMP\Icon2.ico ade7fe5e1aa0c17e60f017e9da6c7b31.exe File created C:\Windows\SHARE_TEMP\Icon3.ico ade7fe5e1aa0c17e60f017e9da6c7b31.exe File created C:\Windows\SHARE_TEMP\Icon7.ico ade7fe5e1aa0c17e60f017e9da6c7b31.exe File created C:\Windows\SHARE_TEMP\Icon14.ico ade7fe5e1aa0c17e60f017e9da6c7b31.exe File created C:\Windows\bugMAKER.bat ade7fe5e1aa0c17e60f017e9da6c7b31.exe File created C:\Windows\SHARE_TEMP\Icon10.ico ade7fe5e1aa0c17e60f017e9da6c7b31.exe File created C:\Windows\SHARE_TEMP\Icon12.ico ade7fe5e1aa0c17e60f017e9da6c7b31.exe File created C:\Windows\winhash_up.exez ade7fe5e1aa0c17e60f017e9da6c7b31.exe File opened for modification C:\Windows\winhash_up.exez ade7fe5e1aa0c17e60f017e9da6c7b31.exe File created C:\Windows\winhash_up.exe ade7fe5e1aa0c17e60f017e9da6c7b31.exe File created C:\Windows\SHARE_TEMP\Icon5.ico ade7fe5e1aa0c17e60f017e9da6c7b31.exe File created C:\Windows\SHARE_TEMP\Icon6.ico ade7fe5e1aa0c17e60f017e9da6c7b31.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5016 cmd.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3184 wrote to memory of 5016 3184 ade7fe5e1aa0c17e60f017e9da6c7b31.exe 92 PID 3184 wrote to memory of 5016 3184 ade7fe5e1aa0c17e60f017e9da6c7b31.exe 92 PID 3184 wrote to memory of 5016 3184 ade7fe5e1aa0c17e60f017e9da6c7b31.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\ade7fe5e1aa0c17e60f017e9da6c7b31.exe"C:\Users\Admin\AppData\Local\Temp\ade7fe5e1aa0c17e60f017e9da6c7b31.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\bugMAKER.bat2⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
PID:5016
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76B
MD595119495434f19bc656d04256c721933
SHA16e87c0a4ecb580c2b76b524ddc9ca3c1fd0d37d6
SHA256a00b4dc2a2f89abcee460912c9e605eea58b01f0b58d346ca6d15cc489034b37
SHA5125b939915a2489bfb0778eddf02be884caa5363972c8142fac35cc295ecbd618ef2a2e0a1483a856670d34b1792a1ce272dd6168e97681f2d10ad02296ee3de6e