Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    93s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/05/2024, 10:43

General

  • Target

    $_3_.exe

  • Size

    1.8MB

  • MD5

    77bfacca17ee1d89833b57f3a746d9a0

  • SHA1

    aa9490c913489c5eafd02f67f875efcb56d23036

  • SHA256

    38571b0965110d07c6fbf4813ab628d4017cf52c681c457fb3f184b644fb0b52

  • SHA512

    21ecc2fce94a58cd39127964730b01722b9dafa20d3af65b023fe83188c08211ba1324849513ffc10b6a359737f98c4d06770dc1954f8880daff938a06581e6f

  • SSDEEP

    49152:/SNY8H0ZGF5j51XdQTPRPgojx1NslvUOl/WkMWAH:oY00Z8F1XdUL

Score
5/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\$_3_.exe
    "C:\Users\Admin\AppData\Local\Temp\$_3_.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1476
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\23549.bat" "C:\Users\Admin\AppData\Local\Temp\4647C9B671674C3FA253299B0B5008AB\""
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2768
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1 -n 1 -w 1000
        3⤵
        • Runs ping.exe
        PID:4884

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\23549.bat

    Filesize

    214B

    MD5

    739fcc7ba42b209fe44bea47e7a8c48f

    SHA1

    bc7a448a7c018133edcf012bc94301623eb42c5b

    SHA256

    69017cdbbe68396f45e41d211b22d800cc1afc0eadbd3440873038585020315c

    SHA512

    2b2b130798b0f4e534626b9fb5deaa10bb1930e6700ac0ba7cf151c1bf3239039a7032ea67ceed86a4a4dbe981064c42a8e0f88fe8361e27002dd8ceb0ea767a

  • C:\Users\Admin\AppData\Local\Temp\4647C9B671674C3FA253299B0B5008AB\4647C9B671674C3FA253299B0B5008AB_LogFile.txt

    Filesize

    9KB

    MD5

    1e6e60e64fa85d6ea80495ea08841b54

    SHA1

    d497f05e80071a7d17e0bb70f8f6ffa3c8cee4a4

    SHA256

    f8f6ce53a4cf8c8eaa8631a8ec85d1e72ae350200ddd23809c8880d1686e2afa

    SHA512

    1af88a5e8347e5b7f90a51ed5ffe29b9531d01ab4604bd9a7f9aafbcfaf9d929071a29ee71946ed06565cd5666fd794198eb45d25a76e5bec6a080265275726c

  • C:\Users\Admin\AppData\Local\Temp\4647C9B671674C3FA253299B0B5008AB\4647C9~1.TXT

    Filesize

    110KB

    MD5

    9dff5b5b5232064acd59cf38d4b08bf2

    SHA1

    665733eaddd6415e1395f2358b828b790a6ca9a9

    SHA256

    be737c16e2432e883645410439fc77fbc9eac87487db26df41d7d3044c2c2fd7

    SHA512

    b51167c999c083881ae027f66c8135c2a673d8e58c2397022ebcf254b204f0a5cfd455395caada659ecb2bfe074df23398cadee55a4dd69ce618f9d80ff7f67b