Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/04/2024, 05:23

General

  • Target

    eccd32ae1e1444b6a9d83728817810f0466e692ac3f58bd906112b4fc5cb7cd0.exe

  • Size

    38KB

  • MD5

    f5aa63b09f7bbe179349d7fd26198a27

  • SHA1

    b031c9a8bb0a314e74f4427ab21ca4fc7b57f9d8

  • SHA256

    eccd32ae1e1444b6a9d83728817810f0466e692ac3f58bd906112b4fc5cb7cd0

  • SHA512

    a70d5b6991db8ff53b0becda97baee92148edde79b8ad6b939b43485530d647c0a2830d944583bb318171177056a2a680433c7a2809bd8388e64f7e5039b5821

  • SSDEEP

    768:nc3C4zd6wl2oVZ3eNU6+qbs8ERJe4vzNT6oG57pHHIzniSfRZt+fkyR+i4HvG0T:nOHdYoVZuNUsdJmNLmHIzniSfrtu94HF

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eccd32ae1e1444b6a9d83728817810f0466e692ac3f58bd906112b4fc5cb7cd0.exe
    "C:\Users\Admin\AppData\Local\Temp\eccd32ae1e1444b6a9d83728817810f0466e692ac3f58bd906112b4fc5cb7cd0.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:3984
    • C:\Windows\winmain.exe
      "C:\Windows\winmain.exe"
      2⤵
      • Executes dropped EXE
      PID:3332
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_DelItM.bat" "
      2⤵
        PID:3904

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\_DelItM.bat

      Filesize

      295B

      MD5

      859b07f5b643593c985c05ff16c55d0a

      SHA1

      fb01762e48be9c15c3519273b10e944f8c5445dd

      SHA256

      72d1248eb831a3991512bfb3c1aa5c205ca46516b4d06e104a4726e32ccd4389

      SHA512

      b4ec66406ea1fb57c99d6ca9504549f98fcd1eb3832034c98273bbb3dda156c3ed47b9cf3004231249714f2010260086e2e83be8341a8ea2fc8464f23345d4dc

    • C:\Windows\winmain.exe

      Filesize

      38KB

      MD5

      c52ea06a066f75b440784e219016ca11

      SHA1

      fd017ba334071d5856f6bd6edd96c82f70a0bb24

      SHA256

      f6b243f615238e083e3ae7fae514909ea427b306361cbbded4ad6460ec378e06

      SHA512

      229939346c6457bdd276a1dce71f2cdcf0cb75341f26ab9cc6a32bf602776de9cca3867fe9fd0fd0aadeb82e203c3720e25b811d05bd2fd0850a80a4ff5a8cb8

    • memory/3332-10-0x0000000000400000-0x0000000000419000-memory.dmp

      Filesize

      100KB

    • memory/3984-0-0x0000000000400000-0x0000000000419000-memory.dmp

      Filesize

      100KB

    • memory/3984-13-0x0000000000400000-0x0000000000419000-memory.dmp

      Filesize

      100KB