Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2024, 18:29
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.DropperX-gen.22837.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Win32.DropperX-gen.22837.exe
Resource
win10v2004-20240226-en
General
-
Target
SecuriteInfo.com.Win32.DropperX-gen.22837.exe
-
Size
10KB
-
MD5
ee27646b11ea5a3a6423ff98775831e3
-
SHA1
ae272f6dc8e2ddd2350db152c65e1cd747cad780
-
SHA256
cc209c28e4d78068b131d1c4c278be88cbdf7d5cf1c5363ebfea28e523112111
-
SHA512
d16757130f75c3e1e9d31490b93e5b33f8b05c72891cee56b4e61fe83bb3d19daca91fcaebecaebc9c3dc3a4eb0ba2652000b68395232cd11362a54785700bd5
-
SSDEEP
192:c2+tUAUg0/4pIKjOt2wUehEr964QmbRu47iH:c2oM4pIKjO79hS64Qci
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation SecuriteInfo.com.Win32.DropperX-gen.22837.exe -
Executes dropped EXE 1 IoCs
pid Process 3716 MetaAccounts.exe -
Loads dropped DLL 1 IoCs
pid Process 3716 MetaAccounts.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4516 SecuriteInfo.com.Win32.DropperX-gen.22837.exe Token: SeDebugPrivilege 3716 MetaAccounts.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4516 wrote to memory of 3716 4516 SecuriteInfo.com.Win32.DropperX-gen.22837.exe 94 PID 4516 wrote to memory of 3716 4516 SecuriteInfo.com.Win32.DropperX-gen.22837.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.DropperX-gen.22837.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.DropperX-gen.22837.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Users\Admin\AppData\Local\Temp\MetaAccounts.exe"C:\Users\Admin\AppData\Local\Temp\MetaAccounts.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:3716
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
244KB
MD537dbeb3e804d61cefed67d1a60dde873
SHA131fb981cc429cd24066363160e49c85fd74df8db
SHA256f15d89d9720eedb94c09b1db32ca6a514e9eff2906da91396ffd7f877714911e
SHA5127279e2354a9e1a583098bc9f6ff9ec05bb2b526ca151265d4c8c2bb42edd15b3d157425bc76e01b9f0e03cb1c87cb46bc94f9a1f47dc2a79daee784d6122f3fa
-
Filesize
3.4MB
MD57b0f105e6d64d4ee914d5b48ec9bbe75
SHA134d69cb025f1fde595b0670e59b0ada7ec074dba
SHA2561f3c694ec608fff224e98fba810fe70adbc7e470f56ab617be0b812c5b1113d0
SHA512e61dcc0a25d542e265be904693363c989e952126bdfe9fc9ccc1c95a0d765dd67970bba2e9d971d796cb4cfa65ccbe54a28eda62cd4853c5eba7fb504c208037
-
Filesize
849KB
MD509db975c2aa349ddaaacdf95bbac88ec
SHA18f8949b8ff4db691d3a12ec94a31822e07e50081
SHA256e1d21ff20fe5bf4b004cefde8c4bcd11d788a963e8e09090c914aa84559ca55d
SHA512ff6894715b0e87546500e2bd0a24d6bfec99631d83ce35a610bea37c050eaa2fa7412deac061410c4e06c1ea59dfa6693f432513f727b29db93977a9b1a03639
-
Filesize
3KB
MD56d91a979c5dcf4c6ab91c4e12c846ec7
SHA1265f0242169c891e399d37d4efe00e1e3ba2daba
SHA2565f0454e9885564c0baa42c608a134d4a74aeede1765f17cb48c53c62cfda59ba
SHA512cece2615f855f4c94727926fb3d381596bc0f11f5237152f1ea31d4409d3ab1e6b11e53b4a279913d719aec955e5141d6b65ee206a1743939da5f46badad51f1
-
Filesize
26KB
MD5970b6e6478ae3ab699f277d77de0cd19
SHA15475cb28998d419b4714343ffa9511ff46322ac2
SHA2565dc372a10f345b1f00ec6a8fa1a2ce569f7e5d63e4f1f8631be367e46bfa34f4
SHA512f3ad2088c5d3fcb770c6d8212650eed95507e107a34f9468ca9db99defd8838443a95e0b59a5a6cb65a18ebbc529110c5348513a321b44223f537096c6d7d6e0
-
Filesize
141KB
MD5ec5a1abee150abe698689211b07cd1ec
SHA1affc3cb47da8fe76986d271cdc3e7ea345cc04e5
SHA256b864da9d88414877cea9b1a016146265a5fb9d0e12f4dbb1dccc0cc998119a54
SHA512a2b55b4ffc3f11546ed8d3457e98b986c089e25229bd687da35d45d63e4860722e8b13826d3a3daa1be843cf3a4ae3da4cf9b6fdcb5d1a4948648537e683789f
-
Filesize
695KB
MD5715a1fbee4665e99e859eda667fe8034
SHA1e13c6e4210043c4976dcdc447ea2b32854f70cc6
SHA256c5c83bbc1741be6ff4c490c0aee34c162945423ec577c646538b2d21ce13199e
SHA512bf9744ccb20f8205b2de39dbe79d34497b4d5c19b353d0f95e87ea7ef7fa1784aea87e10efcef11e4c90451eaa47a379204eb0533aa3018e378dd3511ce0e8ad
-
Filesize
613KB
MD5884506cdf2f3b66006002fba1acc7525
SHA10ad292e9f52a436b2163cb2f38bec08c043043d1
SHA256dd03d9fd3d431f2a87fbadd160e6920989629bc9d66ecf0409fa0ed6c139b575
SHA51254f59bdecddfe687e1c2dbf39e82810b2bf8e75f97af4d4e376edce9217156740868a552866c54ae1ef05d4ecc6635dc61f8219a3b3ed9e3cb7f5117fcf7c717
-
Filesize
392KB
MD5147328def2e79a86d7335a661eecc051
SHA198ff30131d77cf28807d50b97cc92cc8655e235c
SHA2567442d48a24c1747cb17d80e95c4d7343de16e14a252484ace3be3fae55b1d641
SHA512d26f6627f09cab90ae545df68f2df006f0beb988cfadb16f6af56a454e854a9b9c10d2ce787052b80536f9d05b7286d57e42f361f54944e20df99b3c1c49aefb
-
Filesize
25KB
MD5e1e9d7d46e5cd9525c5927dc98d9ecc7
SHA12242627282f9e07e37b274ea36fac2d3cd9c9110
SHA2564f81ffd0dc7204db75afc35ea4291769b07c440592f28894260eea76626a23c6
SHA512da7ab8c0100e7d074f0e680b28d241940733860dfbdc5b8c78428b76e807f27e44d1c5ec95ee80c0b5098e8c5d5da4d48bce86800164f9734a05035220c3ff11
-
Filesize
1.7MB
MD51288823e8e1fca09bb490ce46988188d
SHA1b07fe4a5d032296e3a7d0727216af8c1d2166e91
SHA2566514973856d1767ccb375dcb253400e710fb4f91feb758041d8defe92b1886c5
SHA51288967f64116951092a54118055eab462082f16676ea7565f42515e88765813b53cdfbba5181318e73b668e04ddd030a0bfcf5cf47936772f68df85488b865acd