Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2024, 09:41
Behavioral task
behavioral1
Sample
b4624632352899f5b1dde2aac8902e00.exe
Resource
win7-20240215-en
General
-
Target
b4624632352899f5b1dde2aac8902e00.exe
-
Size
235KB
-
MD5
b4624632352899f5b1dde2aac8902e00
-
SHA1
07ee4519a65231da6cf5ce5673eac51cd04ea1ac
-
SHA256
ae130229b99f6c1e716bce2186d6a269bf9f6abbdb42c040ed0b9f910e65521f
-
SHA512
1cedfa8b4775d20bca40cb266eb93a7a7aa1e925b402bd16d5ebb37e71b1ebe35e3cbafb63943837189ddbb51b3161cabfe15b7a6f1be694f4a4a992ac97f834
-
SSDEEP
3072:K8ASpvo0LKrXEX65ezpxJ2kbJ7mv73E2o/9sY2b:ZASpvo0LKkRzpxJ2kRqroib
Malware Config
Extracted
urelas
112.175.88.207
112.175.88.208
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation b4624632352899f5b1dde2aac8902e00.exe -
Executes dropped EXE 1 IoCs
pid Process 1352 huter.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4984 wrote to memory of 1352 4984 b4624632352899f5b1dde2aac8902e00.exe 90 PID 4984 wrote to memory of 1352 4984 b4624632352899f5b1dde2aac8902e00.exe 90 PID 4984 wrote to memory of 1352 4984 b4624632352899f5b1dde2aac8902e00.exe 90 PID 4984 wrote to memory of 3736 4984 b4624632352899f5b1dde2aac8902e00.exe 91 PID 4984 wrote to memory of 3736 4984 b4624632352899f5b1dde2aac8902e00.exe 91 PID 4984 wrote to memory of 3736 4984 b4624632352899f5b1dde2aac8902e00.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\b4624632352899f5b1dde2aac8902e00.exe"C:\Users\Admin\AppData\Local\Temp\b4624632352899f5b1dde2aac8902e00.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Users\Admin\AppData\Local\Temp\huter.exe"C:\Users\Admin\AppData\Local\Temp\huter.exe"2⤵
- Executes dropped EXE
PID:1352
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "2⤵PID:3736
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512B
MD57295fb9368a0ef278de4b9755bf9fa1b
SHA1db5fa220d77ed7824ae0a4f822e0ce46010a5d77
SHA256dd259fcdbf04aa773ede7515d6a83e5b112ed3d9eef4632cf856771bfeaafd98
SHA512dd1a996311188c0baa54097fc7023f13e71115265fadb9dfa35f2a8d9df8aed1e37bd00ef612577d2eb63ba1b612a7b16a765ebfce3b7c9e7efebe54890eb88a
-
Filesize
235KB
MD58ff51525e49fb27b45c1d6c2aeabdf32
SHA1951d38bc0c7434b3fb8ac849913cbb9e061d5f13
SHA2567ab8c7bc9ac9e35c64f84739dbb563cd5c54ecdcf58ea88e146c84a2c000e84a
SHA512afb121dee69624e9eb11288bcf720159858636be69147e2314465da8ee2e0a5b283282c1da5de7a9c9e9ca89bda99fc31171fae6508b67eb264266fe5368fd61
-
Filesize
274B
MD50c74e8951fcf496750c60c46d884d5b9
SHA12ee048d8dd7883f90dd572848f93e5f5f6e031e0
SHA25668d4d439e8a86141e109ec8c534bd437d28d1b23fb14a19ba8adc6415dc599dd
SHA5127454c4a448cff6206a20af18b47e00737fcd2d8cb2bae8b12461ddf3f462d765537d492e0b4ef5d5570ab177ffda4a405e819ac0dcb64b843221ad84854b9f01