Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    98s
  • max time network
    99s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/04/2024, 21:56

General

  • Target

    18ddc395011f57994480958e1955fdc1707d6cda7cec59c0dab78e506b2ef5d3.exe

  • Size

    2.3MB

  • MD5

    1ae22d846de7735be0b99b3df70b1e7e

  • SHA1

    f14e312594970604950d946245f57b3ae30ed5d6

  • SHA256

    18ddc395011f57994480958e1955fdc1707d6cda7cec59c0dab78e506b2ef5d3

  • SHA512

    1158f49d79d50f3d1f46fdd81f67c8ac6cba1c2d0d2fe41cd25511f68bf101d1c0f0ba2f9f87752ee2d09a68dbdf7a99d10dc47fda204afd465b7c8734685b90

  • SSDEEP

    49152:jmoGDQ7N7bUCQyiyN9j5qwmAJ4tlIU0mdJtM0MXgyPCLjZhBzwkU8M:jmotp7bUCFxDK+dmpMxgJjfTG

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\18ddc395011f57994480958e1955fdc1707d6cda7cec59c0dab78e506b2ef5d3.exe
    "C:\Users\Admin\AppData\Local\Temp\18ddc395011f57994480958e1955fdc1707d6cda7cec59c0dab78e506b2ef5d3.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2684
    • C:\Windows\SysWOW64\regsvr32.exe
      "C:\Windows\System32\regsvr32.exe" -S .\XSIPdSEE.YK
      2⤵
      • Loads dropped DLL
      PID:3220

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\XSIPdSEE.YK

    Filesize

    2.0MB

    MD5

    db82ddc771c4f02ad13c367b521ef7c1

    SHA1

    2e8d4c404133e81a5647f36b97b07ced40543b80

    SHA256

    d3806660d8f94be228f8f289eaccead9d60597bb01c604a8b57cfd0b81cf29c0

    SHA512

    fdc4471142d4b941ecd0a7367246e87b6ad6b0a9c9235c3ba67b7c84cb4c3594647c5b3bd76169ef43486c10b81f0a18eb11685113976d725255511efc9ce8b8

  • memory/3220-4-0x0000000002760000-0x0000000002766000-memory.dmp

    Filesize

    24KB

  • memory/3220-5-0x0000000010000000-0x0000000010208000-memory.dmp

    Filesize

    2.0MB

  • memory/3220-7-0x0000000002B90000-0x0000000002CA3000-memory.dmp

    Filesize

    1.1MB

  • memory/3220-11-0x0000000002CB0000-0x0000000002DA9000-memory.dmp

    Filesize

    996KB

  • memory/3220-8-0x0000000002CB0000-0x0000000002DA9000-memory.dmp

    Filesize

    996KB

  • memory/3220-12-0x0000000010000000-0x0000000010208000-memory.dmp

    Filesize

    2.0MB

  • memory/3220-16-0x0000000002CB0000-0x0000000002DA9000-memory.dmp

    Filesize

    996KB

  • memory/3220-18-0x00000000049F0000-0x0000000004ADB000-memory.dmp

    Filesize

    940KB

  • memory/3220-17-0x0000000002DB0000-0x00000000049ED000-memory.dmp

    Filesize

    28.2MB

  • memory/3220-19-0x0000000004AE0000-0x0000000004BCD000-memory.dmp

    Filesize

    948KB

  • memory/3220-22-0x0000000004AE0000-0x0000000004BCD000-memory.dmp

    Filesize

    948KB

  • memory/3220-23-0x0000000000940000-0x0000000000942000-memory.dmp

    Filesize

    8KB

  • memory/3220-24-0x0000000066210000-0x0000000066214000-memory.dmp

    Filesize

    16KB