Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    100s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/05/2024, 01:25

General

  • Target

    9b1f1510d4b132ecce4e51f817da11b3ab699decee2fc1ac6f69ac0cda261e5c.exe

  • Size

    80KB

  • MD5

    0a987f088c7e6e5806c2627e0e5ca5a5

  • SHA1

    a938953ff2d37fd6c2fe89bf5f222d43be6686bd

  • SHA256

    9b1f1510d4b132ecce4e51f817da11b3ab699decee2fc1ac6f69ac0cda261e5c

  • SHA512

    c60bfbb71fc67e306f0061b828522e149a8dd6838b7c4a6b41041e96398f992f6675be2c32365cd8f6b4a75169d39cb97986ae64b949c071724534e24182d15f

  • SSDEEP

    1536:tRC7yXLfcfdwrUzJmc777TKHcKMlaaWpJSDF/d4K:PayXw6rUzwc777+h/Gz

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9b1f1510d4b132ecce4e51f817da11b3ab699decee2fc1ac6f69ac0cda261e5c.exe
    "C:\Users\Admin\AppData\Local\Temp\9b1f1510d4b132ecce4e51f817da11b3ab699decee2fc1ac6f69ac0cda261e5c.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4088
    • C:\Users\Admin\AppData\Local\Temp\Ikavapit.exe
      "C:\Users\Admin\AppData\Local\Temp\Ikavapit.exe"
      2⤵
      • Executes dropped EXE
      PID:4888

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Ikavapit.exe

    Filesize

    80KB

    MD5

    eccc7f44eea044f9e5f904ff74a201de

    SHA1

    e7e12fc9ce49027a6e0b8c1839466512f7e38bef

    SHA256

    47cf8f25895f0ee5bb4065208d99d4b9bf8aca6d1fb2629a7c3e18562e8e4264

    SHA512

    cd6d54cb015d2f851f837cca8d82f19f5207a758d9e281426be8f39c6c1e8cd842314566237a321f7ee27cf343421bd923f5dbc4787b92c5212def6b13a43160

  • memory/4088-0-0x0000000000600000-0x0000000000601000-memory.dmp

    Filesize

    4KB

  • memory/4088-2-0x0000000000610000-0x0000000000611000-memory.dmp

    Filesize

    4KB

  • memory/4088-9-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/4888-11-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB