Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    161s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/05/2024, 20:36

General

  • Target

    3a268674039dd5ce8b0251215416c530f183afe30f1aff496b6b13b867b2d867.exe

  • Size

    56KB

  • MD5

    6f8c79242fbae0b9f4fb54d0456d7400

  • SHA1

    391fe98e28caf330d911319117e6045ace5cf7e5

  • SHA256

    3a268674039dd5ce8b0251215416c530f183afe30f1aff496b6b13b867b2d867

  • SHA512

    31779dc10b739fa5d9bed5cdebe9e6ff36b6e9e5509fc323e502c57271f6bb01a0b1d0ae894c99299dcd9177396fea47fa876dcdf4354c99b636b015f0d1cc5d

  • SSDEEP

    768:r8eRH+MlFh0pDpuJ84WEi+U6sh7iQroCHmyf+RjFBSuB2XpfsZzK:r9l+W8xFt6sh7iQroCoRB0u0sZ2

Score
9/10
upx

Malware Config

Signatures

  • UPX dump on OEP (original entry point) 4 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3a268674039dd5ce8b0251215416c530f183afe30f1aff496b6b13b867b2d867.exe
    "C:\Users\Admin\AppData\Local\Temp\3a268674039dd5ce8b0251215416c530f183afe30f1aff496b6b13b867b2d867.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1348
    • C:\Users\Admin\AppData\Local\Temp\bkgrnd.exe
      "C:\Users\Admin\AppData\Local\Temp\bkgrnd.exe"
      2⤵
      • Executes dropped EXE
      PID:3420
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=5240 --field-trial-handle=3240,i,13319578961094268484,16557498665191861597,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:3972

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\bkgrnd.exe

      Filesize

      56KB

      MD5

      d829042b82039287b024f03cf0142766

      SHA1

      a85370860706de675ba8fbad3a917bc8bc66c982

      SHA256

      bfd73a014b3573e8a13a2a49ec49c93f5098fb7c52b7dbd72fe675f1e64cdabb

      SHA512

      45b94f3a2a66a0fab6c8c9ff44dc7a5ea1c829017c672685f3beac4d476150c2ec54a52e898a5f8a111c575b0f80469f2d2aa6474111123aaa7acb7e348a3376

    • memory/1348-0-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB

    • memory/1348-1-0x0000000004000000-0x0000000004006000-memory.dmp

      Filesize

      24KB

    • memory/1348-2-0x0000000004000000-0x0000000004006000-memory.dmp

      Filesize

      24KB

    • memory/1348-4-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB

    • memory/3420-20-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB