Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    159s
  • max time network
    165s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/03/2024, 17:57

General

  • Target

    1a0bbfe34ffe7814b010aac7f3a9557ec81a2757b78adad3686de429b1bddd3b.exe

  • Size

    120KB

  • MD5

    d4b7fc48ed42f8e66b2b0d289c825167

  • SHA1

    04fcdcd79b39458e23dfa89eedb32f525d345323

  • SHA256

    1a0bbfe34ffe7814b010aac7f3a9557ec81a2757b78adad3686de429b1bddd3b

  • SHA512

    99a123d7dbcea5c59f5ae92f330a4f6a20a7140b4d8aa4e7ef5cc2358a934172ba231495e38fefcd53511cd0a3787adfb5d92e35a335cf5f7c7bb691b03d68dd

  • SSDEEP

    3072:56v7777777777777777H77777777777777777777777777777tUaIqcNBcDL:eUaILNBcX

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 27 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1a0bbfe34ffe7814b010aac7f3a9557ec81a2757b78adad3686de429b1bddd3b.exe
    "C:\Users\Admin\AppData\Local\Temp\1a0bbfe34ffe7814b010aac7f3a9557ec81a2757b78adad3686de429b1bddd3b.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3024
    • C:\Users\Admin\riixu.exe
      "C:\Users\Admin\riixu.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2424

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\riixu.exe

    Filesize

    120KB

    MD5

    27dd44ce5bda570a3e2024579683ad11

    SHA1

    41123dbfef796cbe952041550961a5e940ca0d3e

    SHA256

    c523137deadb22dfe14c2448656b286f9b983d0b924214c303bfc28d7a06d636

    SHA512

    2dceea0081b50d815f1b2254f0eeee8daf621f056cec4bf8edda0b6921dc8bdd67e54f042c5dd12b5c88fc148db1df8879b8fd61f1af424ac3f01b00ac1b8cbc

  • memory/2424-34-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2424-38-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/3024-0-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/3024-37-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB