Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08/06/2024, 01:21
Static task
static1
Behavioral task
behavioral1
Sample
fd1f6b4810656ebb45ab675922aa86661b1b15fd0d1c5adeba4a44f7034be5a2.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fd1f6b4810656ebb45ab675922aa86661b1b15fd0d1c5adeba4a44f7034be5a2.exe
Resource
win10v2004-20240226-en
General
-
Target
fd1f6b4810656ebb45ab675922aa86661b1b15fd0d1c5adeba4a44f7034be5a2.exe
-
Size
845KB
-
MD5
7ad1909784bfaf8170b36e0f5f98d79c
-
SHA1
d02a1a962abd114639970e4e10cccc6a3815c9d6
-
SHA256
fd1f6b4810656ebb45ab675922aa86661b1b15fd0d1c5adeba4a44f7034be5a2
-
SHA512
a639e56aab9cb7d93edbd1edaed6a58dfa3bcf7223e0fc30643255f4e9ea7bc593112678c40d5109f2bf6ae92e977aeb605ccd9ca0183b814cd14058b3443212
-
SSDEEP
24576:kWS04YNEMuExDiU6E5R9s8xY/2l/dzuIbt+rk:ky4auS+UjfU2TzuIbt+r
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation fd1f6b4810656ebb45ab675922aa86661b1b15fd0d1c5adeba4a44f7034be5a2.exe -
Executes dropped EXE 1 IoCs
pid Process 2172 AudioDriver.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File opened for modification C:\Windows\assembly\Desktop.ini fd1f6b4810656ebb45ab675922aa86661b1b15fd0d1c5adeba4a44f7034be5a2.exe File created C:\Windows\assembly\Desktop.ini fd1f6b4810656ebb45ab675922aa86661b1b15fd0d1c5adeba4a44f7034be5a2.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\assembly fd1f6b4810656ebb45ab675922aa86661b1b15fd0d1c5adeba4a44f7034be5a2.exe File created C:\Windows\assembly\Desktop.ini fd1f6b4810656ebb45ab675922aa86661b1b15fd0d1c5adeba4a44f7034be5a2.exe File opened for modification C:\Windows\assembly\Desktop.ini fd1f6b4810656ebb45ab675922aa86661b1b15fd0d1c5adeba4a44f7034be5a2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 2172 AudioDriver.exe 2172 AudioDriver.exe 2172 AudioDriver.exe 2172 AudioDriver.exe 2172 AudioDriver.exe 2172 AudioDriver.exe 2172 AudioDriver.exe 2172 AudioDriver.exe 2172 AudioDriver.exe 2172 AudioDriver.exe 2172 AudioDriver.exe 2172 AudioDriver.exe 2172 AudioDriver.exe 2172 AudioDriver.exe 2172 AudioDriver.exe 2172 AudioDriver.exe 2172 AudioDriver.exe 2172 AudioDriver.exe 2172 AudioDriver.exe 2172 AudioDriver.exe 2172 AudioDriver.exe 2172 AudioDriver.exe 2172 AudioDriver.exe 2172 AudioDriver.exe 2172 AudioDriver.exe 2172 AudioDriver.exe 2172 AudioDriver.exe 2172 AudioDriver.exe 2172 AudioDriver.exe 2172 AudioDriver.exe 2172 AudioDriver.exe 2172 AudioDriver.exe 2172 AudioDriver.exe 2172 AudioDriver.exe 2172 AudioDriver.exe 2172 AudioDriver.exe 2172 AudioDriver.exe 2172 AudioDriver.exe 2172 AudioDriver.exe 2172 AudioDriver.exe 2172 AudioDriver.exe 2172 AudioDriver.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2172 AudioDriver.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4728 wrote to memory of 2172 4728 fd1f6b4810656ebb45ab675922aa86661b1b15fd0d1c5adeba4a44f7034be5a2.exe 91 PID 4728 wrote to memory of 2172 4728 fd1f6b4810656ebb45ab675922aa86661b1b15fd0d1c5adeba4a44f7034be5a2.exe 91 PID 4728 wrote to memory of 2172 4728 fd1f6b4810656ebb45ab675922aa86661b1b15fd0d1c5adeba4a44f7034be5a2.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\fd1f6b4810656ebb45ab675922aa86661b1b15fd0d1c5adeba4a44f7034be5a2.exe"C:\Users\Admin\AppData\Local\Temp\fd1f6b4810656ebb45ab675922aa86661b1b15fd0d1c5adeba4a44f7034be5a2.exe"1⤵
- Checks computer location settings
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1408 --field-trial-handle=2280,i,4114443225282860369,4764091921472631035,262144 --variations-seed-version /prefetch:81⤵PID:4632
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
845KB
MD57ad1909784bfaf8170b36e0f5f98d79c
SHA1d02a1a962abd114639970e4e10cccc6a3815c9d6
SHA256fd1f6b4810656ebb45ab675922aa86661b1b15fd0d1c5adeba4a44f7034be5a2
SHA512a639e56aab9cb7d93edbd1edaed6a58dfa3bcf7223e0fc30643255f4e9ea7bc593112678c40d5109f2bf6ae92e977aeb605ccd9ca0183b814cd14058b3443212