Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240319-en -
resource tags
arch:x64arch:x86image:win10v2004-20240319-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2024, 01:08
Static task
static1
Behavioral task
behavioral1
Sample
d9262966df4b28d8ae9c39de4ac7ee5c5106bf7956aa45c60f27e817cee3819d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d9262966df4b28d8ae9c39de4ac7ee5c5106bf7956aa45c60f27e817cee3819d.exe
Resource
win10v2004-20240319-en
General
-
Target
d9262966df4b28d8ae9c39de4ac7ee5c5106bf7956aa45c60f27e817cee3819d.exe
-
Size
232KB
-
MD5
601282dc4e45fa953a87fe49d6930059
-
SHA1
54ca96e2da0f04a1865fd122bd7d7d2213ebb149
-
SHA256
d9262966df4b28d8ae9c39de4ac7ee5c5106bf7956aa45c60f27e817cee3819d
-
SHA512
3114203c32784cfbae140dc81b1815f16333b732bbaa0aadd7616be28ef11f1ab0d58ee982a59462224be998c01febd94d4bba61c8a6f8bb645deaf873a143ea
-
SSDEEP
6144:yYASJKenie2xT2NU2OTFQb8Fb0IQUfFmn:yk5nilTFQbI0v+o
Malware Config
Signatures
-
Detects executables packed with aPLib. 2 IoCs
resource yara_rule behavioral2/memory/2512-0-0x0000000000330000-0x000000000035F000-memory.dmp INDICATOR_EXE_Packed_aPLib behavioral2/memory/2512-297-0x0000000000330000-0x000000000035F000-memory.dmp INDICATOR_EXE_Packed_aPLib -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation d9262966df4b28d8ae9c39de4ac7ee5c5106bf7956aa45c60f27e817cee3819d.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\IntelPowerAgent3 = "rundll32.exe shell32.dll, ShellExec_RunDLL C:\\PROGRA~3\\DHJ288~1.EXE" svchost.exe -
Checks for any installed AV software in registry 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Eset\Nod svchost.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Avira svchost.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\AVAST Software\Avast svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2512 set thread context of 2532 2512 d9262966df4b28d8ae9c39de4ac7ee5c5106bf7956aa45c60f27e817cee3819d.exe 93 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2512 wrote to memory of 2532 2512 d9262966df4b28d8ae9c39de4ac7ee5c5106bf7956aa45c60f27e817cee3819d.exe 93 PID 2512 wrote to memory of 2532 2512 d9262966df4b28d8ae9c39de4ac7ee5c5106bf7956aa45c60f27e817cee3819d.exe 93 PID 2512 wrote to memory of 2532 2512 d9262966df4b28d8ae9c39de4ac7ee5c5106bf7956aa45c60f27e817cee3819d.exe 93 PID 2512 wrote to memory of 2532 2512 d9262966df4b28d8ae9c39de4ac7ee5c5106bf7956aa45c60f27e817cee3819d.exe 93 PID 2512 wrote to memory of 2532 2512 d9262966df4b28d8ae9c39de4ac7ee5c5106bf7956aa45c60f27e817cee3819d.exe 93 PID 2512 wrote to memory of 2532 2512 d9262966df4b28d8ae9c39de4ac7ee5c5106bf7956aa45c60f27e817cee3819d.exe 93 PID 2512 wrote to memory of 2532 2512 d9262966df4b28d8ae9c39de4ac7ee5c5106bf7956aa45c60f27e817cee3819d.exe 93 PID 2512 wrote to memory of 2532 2512 d9262966df4b28d8ae9c39de4ac7ee5c5106bf7956aa45c60f27e817cee3819d.exe 93 PID 2512 wrote to memory of 2532 2512 d9262966df4b28d8ae9c39de4ac7ee5c5106bf7956aa45c60f27e817cee3819d.exe 93 PID 2512 wrote to memory of 2532 2512 d9262966df4b28d8ae9c39de4ac7ee5c5106bf7956aa45c60f27e817cee3819d.exe 93 PID 2512 wrote to memory of 2532 2512 d9262966df4b28d8ae9c39de4ac7ee5c5106bf7956aa45c60f27e817cee3819d.exe 93 PID 2512 wrote to memory of 4076 2512 d9262966df4b28d8ae9c39de4ac7ee5c5106bf7956aa45c60f27e817cee3819d.exe 96 PID 2512 wrote to memory of 4076 2512 d9262966df4b28d8ae9c39de4ac7ee5c5106bf7956aa45c60f27e817cee3819d.exe 96 PID 2512 wrote to memory of 4076 2512 d9262966df4b28d8ae9c39de4ac7ee5c5106bf7956aa45c60f27e817cee3819d.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\d9262966df4b28d8ae9c39de4ac7ee5c5106bf7956aa45c60f27e817cee3819d.exe"C:\Users\Admin\AppData\Local\Temp\d9262966df4b28d8ae9c39de4ac7ee5c5106bf7956aa45c60f27e817cee3819d.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\SysWOW64\svchost.exeC:\ProgramData\dhj288dfj6.exe2⤵
- Adds Run key to start application
- Checks for any installed AV software in registry
- Suspicious behavior: EnumeratesProcesses
PID:2532
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\ohgF7A6.tmp.bat" "C:\Users\Admin\AppData\Local\Temp\d9262966df4b28d8ae9c39de4ac7ee5c5106bf7956aa45c60f27e817cee3819d.exe""2⤵PID:4076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=2780 --field-trial-handle=2244,i,11986678581565715302,451159359636456336,262144 --variations-seed-version /prefetch:81⤵PID:3536
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34B
MD5471c223fc0fcb73d440f64cb63e4d992
SHA1393b9cd289605762fa566ce4a181938afc5d2bff
SHA256e8d8f9b4defa6277fd1d201dde434818ecb5f1a79ce904c688cba9cac91fafa4
SHA512552ebafa2fc04617d4e702d0a368221804973d9f7a87a03c2b73327eaa17813ab2a781da1415783601b2d82d4a51e0af039f6d28a3f919d09cad07f7310e9e8a