Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29/03/2024, 04:47
Static task
static1
Behavioral task
behavioral1
Sample
fcf2ea48e4e09c4b88810ed4f7b42b1c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fcf2ea48e4e09c4b88810ed4f7b42b1c.exe
Resource
win10v2004-20240226-en
General
-
Target
fcf2ea48e4e09c4b88810ed4f7b42b1c.exe
-
Size
43KB
-
MD5
fcf2ea48e4e09c4b88810ed4f7b42b1c
-
SHA1
4dd462cd8e428157f421dd2fa3f5280804d8ab79
-
SHA256
8d076112983ee6b57e3758366de0f39cf10ff051733fa4ff406a507a9268bae1
-
SHA512
b8ea4bec32b0c5deee33711e96a8ab8f4e855426d1051eb42019b21e2337dbe24de805c02e71a9c316322fe76345e89c19b68b4dfadefa382ab0c89cd626df0e
-
SSDEEP
768:bgX4zYcgTEu6QOaryfjqDDw3sCu5b+syQNY:bgGYcA/53GADw8Cl/N
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation fcf2ea48e4e09c4b88810ed4f7b42b1c.exe -
Executes dropped EXE 1 IoCs
pid Process 3164 hasfj.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1704 wrote to memory of 3164 1704 fcf2ea48e4e09c4b88810ed4f7b42b1c.exe 87 PID 1704 wrote to memory of 3164 1704 fcf2ea48e4e09c4b88810ed4f7b42b1c.exe 87 PID 1704 wrote to memory of 3164 1704 fcf2ea48e4e09c4b88810ed4f7b42b1c.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\fcf2ea48e4e09c4b88810ed4f7b42b1c.exe"C:\Users\Admin\AppData\Local\Temp\fcf2ea48e4e09c4b88810ed4f7b42b1c.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
PID:3164
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD52d3ae9fe4c2f6929596224f929b3fa72
SHA19c7d4300fce6d1915a85537e8fcb6d2bbbccec93
SHA256e33742d387f2316ed6f139e93a5db9fe23925194d18d0dce307388b348dcbd57
SHA512dd3a2eab6fa0f095ddcc6cdd94f86a9f47b3f28147c11de40a7e69b2d1cf6df440c7132956d0db16e8b9b26f187d027d0f2070f8fa537af560240dc476b507df