Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
186s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/04/2024, 23:34
Static task
static1
Behavioral task
behavioral1
Sample
db2fdda56880a6ac896daffedc7c763f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
db2fdda56880a6ac896daffedc7c763f.exe
Resource
win10v2004-20240226-en
General
-
Target
db2fdda56880a6ac896daffedc7c763f.exe
-
Size
114KB
-
MD5
db2fdda56880a6ac896daffedc7c763f
-
SHA1
85b6a36751ed6e335581e692d48c26ed7bfae294
-
SHA256
bd344437dd6a8ee531a4dac429651109e5bbe5c9968bf6999ce15bf66c4b6b02
-
SHA512
5987d03e3a3617c6b0414e415a314a2450458b046cba9a646dadc4b59bdab0ae28e102befdbaff394060d1c94b75d2ac19e53649b453f755ce423676562e43c0
-
SSDEEP
768:dxDDnyAiIbhn+oRTaFSxjORUh6EDFAnAL+7DUdjaYoCMHosadujaOnNP0mPekYFa:dxDDnd1RaqOrsdSCM+qvNYF++28kO1cX
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000\Control Panel\International\Geo\Nation db2fdda56880a6ac896daffedc7c763f.exe -
Executes dropped EXE 1 IoCs
pid Process 3900 hcbnaf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1468 wrote to memory of 3900 1468 db2fdda56880a6ac896daffedc7c763f.exe 87 PID 1468 wrote to memory of 3900 1468 db2fdda56880a6ac896daffedc7c763f.exe 87 PID 1468 wrote to memory of 3900 1468 db2fdda56880a6ac896daffedc7c763f.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\db2fdda56880a6ac896daffedc7c763f.exe"C:\Users\Admin\AppData\Local\Temp\db2fdda56880a6ac896daffedc7c763f.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Users\Admin\AppData\Local\Temp\hcbnaf.exe"C:\Users\Admin\AppData\Local\Temp\hcbnaf.exe"2⤵
- Executes dropped EXE
PID:3900
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
114KB
MD5d3fa90660cd4c6a2dca77058e564ffef
SHA1d1798d05dc3d3df41f91aafb6dab63d033a68e1a
SHA25604f5c6464d48ac4434d032c7d50192a3ae2c2b37cb1f7f95e23d570210dc754f
SHA512b1f440c26e5d68529cd825f5dd76f8f16c587622bcc6ef74da5e99e27041f7e8c235f00d8cff28bb6020ba61d89ac8af0d32e55011f59ed38081e9a0543e82e3