Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
16/03/2024, 08:09
Static task
static1
Behavioral task
behavioral1
Sample
cd8bb3ec79c567ba99d526f2c48b8a1a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cd8bb3ec79c567ba99d526f2c48b8a1a.exe
Resource
win10v2004-20240226-en
General
-
Target
cd8bb3ec79c567ba99d526f2c48b8a1a.exe
-
Size
20KB
-
MD5
cd8bb3ec79c567ba99d526f2c48b8a1a
-
SHA1
6c4ccaa9b52142282c4bcca471218930d8cd375a
-
SHA256
eed7016ab67bc884ac7015f7e39353aea74d4fc66c97f4cb81fef688f407ef89
-
SHA512
a0ea7e4a1675d42e64cbb8616fd53e1fc77a10e9d094bdd9b4e6a24e24f3344db2523b3136ec6c4ce43c5687ad373c14553bff27a98792502dfe8d3d9337e94b
-
SSDEEP
384:nWn9PMRxJYeDWj66R04oNCCrsEajK3tQV/w7ct8EItKIe+ulnfWjvOeo:nEWJYeDY66qk/ItQ27ctot5ebln
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation cd8bb3ec79c567ba99d526f2c48b8a1a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\multimediaControls.chl\CLSID cd8bb3ec79c567ba99d526f2c48b8a1a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\multimediaControls.chl cd8bb3ec79c567ba99d526f2c48b8a1a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\multimediaControls.chl\CLSID\ = "{6BF52A52-394A-11D3-B153-00C04F79FAA6}" cd8bb3ec79c567ba99d526f2c48b8a1a.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1520 wrote to memory of 1176 1520 cd8bb3ec79c567ba99d526f2c48b8a1a.exe 108 PID 1520 wrote to memory of 1176 1520 cd8bb3ec79c567ba99d526f2c48b8a1a.exe 108 PID 1520 wrote to memory of 1176 1520 cd8bb3ec79c567ba99d526f2c48b8a1a.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\cd8bb3ec79c567ba99d526f2c48b8a1a.exe"C:\Users\Admin\AppData\Local\Temp\cd8bb3ec79c567ba99d526f2c48b8a1a.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\awer0.bat" "2⤵PID:1176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4088 --field-trial-handle=3088,i,14310325015283915034,7660943942870463106,262144 --variations-seed-version /prefetch:81⤵PID:2176
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
274B
MD5af383d8e9fbe189f9c81b66be52b89f3
SHA1764728a495ebda06451878621495fb3359fbb4f9
SHA2563032986b6dd0c1cbbbbc70f9df2eefba4042ab61fe579d29f4f26d12a61a9fa8
SHA5123c8f333362e3092f311cbd0fb77d2e241b549c1eaf8f8edc1136a12625dbb07f981e40db0a74bb319b2176e76310ddd2b1bb261b7e4b203f64b23b7194137caf