Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26/03/2024, 01:50
Behavioral task
behavioral1
Sample
31ed1cda395acd7022235a65002c4cf7.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
31ed1cda395acd7022235a65002c4cf7.exe
Resource
win10v2004-20240226-en
General
-
Target
31ed1cda395acd7022235a65002c4cf7.exe
-
Size
116KB
-
MD5
31ed1cda395acd7022235a65002c4cf7
-
SHA1
f3b0c1025cebb7d567c8f6f166aada43215976a2
-
SHA256
18a1a90e634f769a353d47bf4caf9f4111101866126c2c5ec34f1f00365e308b
-
SHA512
166dc940e1a068941af7841c90b356cf0f9bcf21c9a67c56229a808848a772ab5aef90cf561724f323957101f4fc06c2b22e376f0b59115aee543933c58a3d28
-
SSDEEP
1536:T6QFElP6n+gxmddpMOtEvwDpjCGYQbN/PKwNLX9R:T6a+rdOOtEvwDpjLz9
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation 31ed1cda395acd7022235a65002c4cf7.exe -
Executes dropped EXE 1 IoCs
pid Process 452 asih.exe -
resource yara_rule behavioral2/memory/4596-0-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/files/0x000700000001e59e-13.dat upx behavioral2/memory/4596-17-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/452-26-0x0000000000500000-0x0000000000510000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4596 wrote to memory of 452 4596 31ed1cda395acd7022235a65002c4cf7.exe 89 PID 4596 wrote to memory of 452 4596 31ed1cda395acd7022235a65002c4cf7.exe 89 PID 4596 wrote to memory of 452 4596 31ed1cda395acd7022235a65002c4cf7.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\31ed1cda395acd7022235a65002c4cf7.exe"C:\Users\Admin\AppData\Local\Temp\31ed1cda395acd7022235a65002c4cf7.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:452
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
116KB
MD51c02c031d55539f19e346e1f3f702cae
SHA1b91f82dfc58bb9981c48d1b4b041ae69279d6df7
SHA25672143b383014c5ba81d906ff40297684252ae766542437105db45dfafed91a9a
SHA512a5c66ee0253fd00e4be8d5d55e26a390c4978dd90d288f5871ca1d75860e52397056197f6f38d419bd71dd603928ead87ddb64183cfedd526ec872c602d6c84a