Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
31/05/2024, 02:43
Static task
static1
Behavioral task
behavioral1
Sample
820cd988df97ea0c180943b066cc8cd4.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
820cd988df97ea0c180943b066cc8cd4.exe
Resource
win10v2004-20240426-en
General
-
Target
820cd988df97ea0c180943b066cc8cd4.exe
-
Size
524KB
-
MD5
820cd988df97ea0c180943b066cc8cd4
-
SHA1
04fae8cf45b193382ffe5891e86ab7ad3d4be46c
-
SHA256
4e5a74d0131244f48e724e15596f31d4dfe515bb9671516c78564d7fcb67b9ee
-
SHA512
c492cd463c841c519b0dcd4d392270afd33adace9cc4d334d01c8989157bcd8f2140f83ed1698abf00bf897c9ae1c844c9695f9448116bad669e528742b9f329
-
SSDEEP
12288:kXNo92q8Fxta+MHzEqAL8BxrPKIkQXGU9zlnNW7:4Ni8Fx8+MHWLQPKIkQXGYBnNW7
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation 820cd988df97ea0c180943b066cc8cd4.exe -
Executes dropped EXE 3 IoCs
pid Process 3472 կիյտյ.exe 3676 կիյտյ.exe 4264 կիյտյ.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTcbPrivilege 4264 կիյտյ.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4660 820cd988df97ea0c180943b066cc8cd4.exe 3472 կիյտյ.exe 3676 կիյտյ.exe 4264 կիյտյ.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4660 wrote to memory of 3472 4660 820cd988df97ea0c180943b066cc8cd4.exe 81 PID 4660 wrote to memory of 3472 4660 820cd988df97ea0c180943b066cc8cd4.exe 81 PID 4660 wrote to memory of 3472 4660 820cd988df97ea0c180943b066cc8cd4.exe 81 PID 3472 wrote to memory of 3676 3472 կիյտյ.exe 82 PID 3472 wrote to memory of 3676 3472 կիյտյ.exe 82 PID 3472 wrote to memory of 3676 3472 կիյտյ.exe 82 PID 3676 wrote to memory of 1252 3676 կիյտյ.exe 83 PID 3676 wrote to memory of 1252 3676 կիյտյ.exe 83 PID 3676 wrote to memory of 1252 3676 կիյտյ.exe 83 PID 3676 wrote to memory of 1252 3676 կիյտյ.exe 83 PID 4264 wrote to memory of 3388 4264 կիյտյ.exe 96 PID 4264 wrote to memory of 3388 4264 կիյտյ.exe 96 PID 4264 wrote to memory of 3388 4264 կիյտյ.exe 96 PID 4264 wrote to memory of 3388 4264 կիյտյ.exe 96 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\820cd988df97ea0c180943b066cc8cd4.exe"C:\Users\Admin\AppData\Local\Temp\820cd988df97ea0c180943b066cc8cd4.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\ProgramData\կիյտյ.exe"C:\ProgramData\կիյտյ.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Users\Admin\AppData\Roaming\speedlink\կիյտյ.exeC:\Users\Admin\AppData\Roaming\speedlink\կիյտյ.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe4⤵PID:1252
-
-
-
-
C:\Users\Admin\AppData\Roaming\speedlink\կիյտյ.exeC:\Users\Admin\AppData\Roaming\speedlink\կիյտյ.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:3388
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
524KB
MD5820cd988df97ea0c180943b066cc8cd4
SHA104fae8cf45b193382ffe5891e86ab7ad3d4be46c
SHA2564e5a74d0131244f48e724e15596f31d4dfe515bb9671516c78564d7fcb67b9ee
SHA512c492cd463c841c519b0dcd4d392270afd33adace9cc4d334d01c8989157bcd8f2140f83ed1698abf00bf897c9ae1c844c9695f9448116bad669e528742b9f329
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-711569230-3659488422-571408806-1000\0f5007522459c86e95ffcc62f32308f1_5fd6b8d9-48b3-42c0-adc7-08f9fe7c965e
Filesize1KB
MD5e675a944590df523f5ed83ab05604248
SHA18887e41de8967a18577e2c03ea57bd81bf0efacc
SHA256f7aa5ef3d91c650acdfcec642d544f6a44d3089c7cd193eda7bb4ea55611b2df
SHA512875d2289cabf6f52a0e939e4553be9787b20f445508f98013b0bacafdb85caad49fd4198ed376e7f8e4544e6f192cb46ec211456a985f5829026f675d68f0908