Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10/05/2024, 01:16
Static task
static1
Behavioral task
behavioral1
Sample
Photo1.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
Photo1.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
Photo2.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Photo2.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
TConf.exe
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
TConf.exe
Resource
win10v2004-20240508-en
General
-
Target
Photo2.exe
-
Size
37KB
-
MD5
7b6fe54446ff5d20230b2d6f5ce45fad
-
SHA1
d6404f74516285cc40272d345461d9abd90823b3
-
SHA256
70aae83fad8fbbbd63c6a348fc4716abdd19a4f9bb9d011cb0f80850beb4543a
-
SHA512
77ce4a4fbe85e9b2a4c63637b0247724ee33ca0b6024a6a39138c5e73b0a3b3ed36a11a14bed04e05ba1babac183e9bae30a0b5b01c1fb3a655a78a81063f477
-
SSDEEP
768:LX3pbhvZSjPrIHHVuLIFOXds2L6cJj3AD2DLyxNCK1mM:d3Sr0HSPXdVLDpDLyxNN
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Photo2.exe -
Deletes itself 1 IoCs
pid Process 3412 IEXPAND.EXE -
Executes dropped EXE 1 IoCs
pid Process 3412 IEXPAND.EXE -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\iexpand.exe = "iexpand.exe" IEXPAND.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\iexpand.exe = "iexpand.exe" Photo2.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\IEXPAND.EXE Photo2.exe File opened for modification C:\WINDOWS\SysWOW64\IEXPAND.EXE Photo2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 392 Photo2.exe 392 Photo2.exe 392 Photo2.exe 392 Photo2.exe 392 Photo2.exe 392 Photo2.exe 3412 IEXPAND.EXE 3412 IEXPAND.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 392 wrote to memory of 3412 392 Photo2.exe 92 PID 392 wrote to memory of 3412 392 Photo2.exe 92 PID 392 wrote to memory of 3412 392 Photo2.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\Photo2.exe"C:\Users\Admin\AppData\Local\Temp\Photo2.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:392 -
C:\WINDOWS\SysWOW64\IEXPAND.EXE"C:\WINDOWS\SYSTEM32\IEXPAND.EXE" C:\Users\Admin\AppData\Local\Temp\Photo2.exe2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:3412
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD57b6fe54446ff5d20230b2d6f5ce45fad
SHA1d6404f74516285cc40272d345461d9abd90823b3
SHA25670aae83fad8fbbbd63c6a348fc4716abdd19a4f9bb9d011cb0f80850beb4543a
SHA51277ce4a4fbe85e9b2a4c63637b0247724ee33ca0b6024a6a39138c5e73b0a3b3ed36a11a14bed04e05ba1babac183e9bae30a0b5b01c1fb3a655a78a81063f477