Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
18/04/2024, 23:08
Behavioral task
behavioral1
Sample
6e260e670af0036709d6b8e72541f60e45a02bd6a5b0c0bb8260a1574bb96619.exe
Resource
win7-20240221-en
General
-
Target
6e260e670af0036709d6b8e72541f60e45a02bd6a5b0c0bb8260a1574bb96619.exe
-
Size
366KB
-
MD5
8d485f83022e4be758176248bb551a09
-
SHA1
a75b23f6102cf0b4ba71590ec1da7f72421d74e4
-
SHA256
6e260e670af0036709d6b8e72541f60e45a02bd6a5b0c0bb8260a1574bb96619
-
SHA512
80c45c3eb593ceb284fa513245ffb5c0d5a971795250552d0f1b24959fba1cf5943f7843421b69f945367578db175af1fbd4b74dba7c73d93065288ee76edbfa
-
SSDEEP
6144:1o3whi+1Py3V0a24kOn+Sr72iyjmhuKtUYiw52hVOcvBRMHkWYHpo:YKf1PyKa2anKjm3OYZ2hocvHK
Malware Config
Extracted
urelas
1.234.83.146
133.242.129.155
218.54.31.165
218.54.31.226
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-355664440-2199602304-1223909400-1000\Control Panel\International\Geo\Nation 6e260e670af0036709d6b8e72541f60e45a02bd6a5b0c0bb8260a1574bb96619.exe Key value queried \REGISTRY\USER\S-1-5-21-355664440-2199602304-1223909400-1000\Control Panel\International\Geo\Nation zikeh.exe -
Executes dropped EXE 2 IoCs
pid Process 4112 zikeh.exe 4204 tozuz.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4204 tozuz.exe 4204 tozuz.exe 4204 tozuz.exe 4204 tozuz.exe 4204 tozuz.exe 4204 tozuz.exe 4204 tozuz.exe 4204 tozuz.exe 4204 tozuz.exe 4204 tozuz.exe 4204 tozuz.exe 4204 tozuz.exe 4204 tozuz.exe 4204 tozuz.exe 4204 tozuz.exe 4204 tozuz.exe 4204 tozuz.exe 4204 tozuz.exe 4204 tozuz.exe 4204 tozuz.exe 4204 tozuz.exe 4204 tozuz.exe 4204 tozuz.exe 4204 tozuz.exe 4204 tozuz.exe 4204 tozuz.exe 4204 tozuz.exe 4204 tozuz.exe 4204 tozuz.exe 4204 tozuz.exe 4204 tozuz.exe 4204 tozuz.exe 4204 tozuz.exe 4204 tozuz.exe 4204 tozuz.exe 4204 tozuz.exe 4204 tozuz.exe 4204 tozuz.exe 4204 tozuz.exe 4204 tozuz.exe 4204 tozuz.exe 4204 tozuz.exe 4204 tozuz.exe 4204 tozuz.exe 4204 tozuz.exe 4204 tozuz.exe 4204 tozuz.exe 4204 tozuz.exe 4204 tozuz.exe 4204 tozuz.exe 4204 tozuz.exe 4204 tozuz.exe 4204 tozuz.exe 4204 tozuz.exe 4204 tozuz.exe 4204 tozuz.exe 4204 tozuz.exe 4204 tozuz.exe 4204 tozuz.exe 4204 tozuz.exe 4204 tozuz.exe 4204 tozuz.exe 4204 tozuz.exe 4204 tozuz.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3332 wrote to memory of 4112 3332 6e260e670af0036709d6b8e72541f60e45a02bd6a5b0c0bb8260a1574bb96619.exe 89 PID 3332 wrote to memory of 4112 3332 6e260e670af0036709d6b8e72541f60e45a02bd6a5b0c0bb8260a1574bb96619.exe 89 PID 3332 wrote to memory of 4112 3332 6e260e670af0036709d6b8e72541f60e45a02bd6a5b0c0bb8260a1574bb96619.exe 89 PID 3332 wrote to memory of 1928 3332 6e260e670af0036709d6b8e72541f60e45a02bd6a5b0c0bb8260a1574bb96619.exe 90 PID 3332 wrote to memory of 1928 3332 6e260e670af0036709d6b8e72541f60e45a02bd6a5b0c0bb8260a1574bb96619.exe 90 PID 3332 wrote to memory of 1928 3332 6e260e670af0036709d6b8e72541f60e45a02bd6a5b0c0bb8260a1574bb96619.exe 90 PID 4112 wrote to memory of 4204 4112 zikeh.exe 99 PID 4112 wrote to memory of 4204 4112 zikeh.exe 99 PID 4112 wrote to memory of 4204 4112 zikeh.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\6e260e670af0036709d6b8e72541f60e45a02bd6a5b0c0bb8260a1574bb96619.exe"C:\Users\Admin\AppData\Local\Temp\6e260e670af0036709d6b8e72541f60e45a02bd6a5b0c0bb8260a1574bb96619.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3332 -
C:\Users\Admin\AppData\Local\Temp\zikeh.exe"C:\Users\Admin\AppData\Local\Temp\zikeh.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Users\Admin\AppData\Local\Temp\tozuz.exe"C:\Users\Admin\AppData\Local\Temp\tozuz.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4204
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵PID:1928
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD5319ae29c1070879d12f867d45e6607ce
SHA104df641032207345c0be275ccef5280af41c5fb2
SHA256a15e8bb02ae31b4f3100a4101fed0f21ec28ab4e8e753902193fb3666c3dd317
SHA512a09116eb0cdc528c98efb29a4c86aa40ffe4a3f1ba5279de36a967246dde08b80a0704674e3d4ce0ee90b0c0483ed85afb5786108230a989f04f072b156f2732
-
Filesize
512B
MD57c3375aa639eb5957f2b873f79679af3
SHA19b583eb0e18b67e520d2915425b46c108e4d7847
SHA25664cb4cd628eb6d33ae3214390e35767fbc902f1007512b2c6e574a72ac8d96a4
SHA5123ead7f543766e906d0de1db6c51f0487b1ea75eb295f91fd96c0d7ab9ef5cc3a9e3fe8947d3263d4a1867ba0baadb52eae34d5ecfbb353363baef31de84c707f
-
Filesize
208KB
MD54f59711ba07b3a0bd4bc33adf391065f
SHA173080f5260900c6e16dbc513e7207c1ba0ed7ef0
SHA2561bb1e2e923fedb746d4c3b73f5d520c898bc090d6341eeba723e9cdb24f46064
SHA512c81721e372614bc3c68243ff6eadfa2b8cce32e43067ac8cfe3bc982612eb200f870b637c9f6ddeab6c2859d1d6cdb5945e3cfb67c0116cb6dc386153886dff0
-
Filesize
366KB
MD57e2d42ad6f320fb64b7eecfaec2ebf46
SHA11e8dfee4b4967f65f3fb3aa6197c16519a4f72e7
SHA25673639b9a501916032c4c39d8b6b1bcc8d59df71398e269d005216c0f1c49cdf4
SHA5121e401df65cb94a486a3b0b9e0b2daaf86fc75ff9557185cc037a6c4bfef8e2325535b47c5c2ffdb7aa4415a14b3b6b98c7d514d5b6f3c47ab8c0600ed020c704