Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
19/05/2024, 21:15
Static task
static1
Behavioral task
behavioral1
Sample
495b7a281fde282e15b04fb45fe34343c1db9c4b71f0e3b24f3b963ee5c6869c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
495b7a281fde282e15b04fb45fe34343c1db9c4b71f0e3b24f3b963ee5c6869c.exe
Resource
win10v2004-20240426-en
General
-
Target
495b7a281fde282e15b04fb45fe34343c1db9c4b71f0e3b24f3b963ee5c6869c.exe
-
Size
2.7MB
-
MD5
a285a27e074ef2a209aaa6169d443310
-
SHA1
f7b28986b7576ed51b58919a13644f466270e316
-
SHA256
495b7a281fde282e15b04fb45fe34343c1db9c4b71f0e3b24f3b963ee5c6869c
-
SHA512
e810ffb7121eca9bdab81dd7ac12f3235a823d9ab01cbe6f977adf142184f776f9596a6623947d35c7cb8eb56a7adb0d42965e07dce8510db0436b69f9bd952a
-
SSDEEP
49152:9jyT+P66XbOP/ZzA2DItg1Hoaz6wecYfFkURwlhyAuLjf/IVgs5+xP:oTE66yXZ02DwUHoazRofxIhELjf/IVgs
Malware Config
Signatures
-
Detects binaries and memory artifacts referencing sandbox DLLs typically observed in sandbox evasion 4 IoCs
resource yara_rule behavioral2/memory/1096-1-0x0000000000960000-0x0000000000C22000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxHookingDLL behavioral2/files/0x00030000000229e0-14.dat INDICATOR_SUSPICIOUS_EXE_SandboxHookingDLL behavioral2/files/0x00030000000229e0-35.dat INDICATOR_SUSPICIOUS_EXE_SandboxHookingDLL behavioral2/memory/1248-38-0x0000000000B90000-0x0000000000E52000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxHookingDLL -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation 495b7a281fde282e15b04fb45fe34343c1db9c4b71f0e3b24f3b963ee5c6869c.exe -
Executes dropped EXE 1 IoCs
pid Process 1248 Amata Diann.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 780 1248 WerFault.exe 91 -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3164 PING.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1096 495b7a281fde282e15b04fb45fe34343c1db9c4b71f0e3b24f3b963ee5c6869c.exe 1096 495b7a281fde282e15b04fb45fe34343c1db9c4b71f0e3b24f3b963ee5c6869c.exe 1248 Amata Diann.exe 1248 Amata Diann.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1096 495b7a281fde282e15b04fb45fe34343c1db9c4b71f0e3b24f3b963ee5c6869c.exe Token: SeIncBasePriorityPrivilege 1096 495b7a281fde282e15b04fb45fe34343c1db9c4b71f0e3b24f3b963ee5c6869c.exe Token: SeDebugPrivilege 1248 Amata Diann.exe Token: SeIncBasePriorityPrivilege 1248 Amata Diann.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1096 wrote to memory of 1248 1096 495b7a281fde282e15b04fb45fe34343c1db9c4b71f0e3b24f3b963ee5c6869c.exe 91 PID 1096 wrote to memory of 1248 1096 495b7a281fde282e15b04fb45fe34343c1db9c4b71f0e3b24f3b963ee5c6869c.exe 91 PID 1096 wrote to memory of 1248 1096 495b7a281fde282e15b04fb45fe34343c1db9c4b71f0e3b24f3b963ee5c6869c.exe 91 PID 1096 wrote to memory of 5060 1096 495b7a281fde282e15b04fb45fe34343c1db9c4b71f0e3b24f3b963ee5c6869c.exe 92 PID 1096 wrote to memory of 5060 1096 495b7a281fde282e15b04fb45fe34343c1db9c4b71f0e3b24f3b963ee5c6869c.exe 92 PID 1096 wrote to memory of 5060 1096 495b7a281fde282e15b04fb45fe34343c1db9c4b71f0e3b24f3b963ee5c6869c.exe 92 PID 5060 wrote to memory of 3164 5060 cmd.exe 94 PID 5060 wrote to memory of 3164 5060 cmd.exe 94 PID 5060 wrote to memory of 3164 5060 cmd.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\495b7a281fde282e15b04fb45fe34343c1db9c4b71f0e3b24f3b963ee5c6869c.exe"C:\Users\Admin\AppData\Local\Temp\495b7a281fde282e15b04fb45fe34343c1db9c4b71f0e3b24f3b963ee5c6869c.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Users\Admin\AppData\Local\Temp\Amata Diann.exe"C:\Users\Admin\AppData\Local\Temp\Amata Diann.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1248 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1248 -s 15723⤵
- Program crash
PID:780
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\495b7a281fde282e15b04fb45fe34343c1db9c4b71f0e3b24f3b963ee5c6869c.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30003⤵
- Runs ping.exe
PID:3164
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1248 -ip 12481⤵PID:4452
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD574f1854819ec782122d7837edfe5a201
SHA1c9d9031663b185ccdfd5a4f05bcd54ec5368ee14
SHA25610ef67cd77372c85f5912301d772acea6d0f9202853f77be0d430d78318f8716
SHA512452f982d7b231a2fa0a8a0e21fdb4462bda3451187dcc95a978ff8ae8ced8797371aa34d5e21f80dc4b02a99d2763efd1666bb017cc9cebda05e42e3d2cadc08
-
Filesize
2.7MB
MD5801d73ca7ea8f919f48cb15ba329ce6f
SHA18966d7107adb8864a60eb18ef919a53b788d2da7
SHA256559816d885d7f1562d90a4c0c43693e24738098f2e4b05f3f24620e33f8e3460
SHA5120dc5612a8b897ee0d1fdccffdece0d0a582037dfe7e49d525e45ae6c017507d11163b7affb90b16a83e99b9d1c98376cf56c00154663b432675116af1bddb2eb