Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
68s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09/06/2024, 05:07
Static task
static1
Behavioral task
behavioral1
Sample
d206f398d6b06df7b65c5871145b5964.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
d206f398d6b06df7b65c5871145b5964.exe
Resource
win10v2004-20240508-en
General
-
Target
d206f398d6b06df7b65c5871145b5964.exe
-
Size
391KB
-
MD5
d206f398d6b06df7b65c5871145b5964
-
SHA1
af643f573082ce5a3662432f915040b3a3b7121e
-
SHA256
df13f06c323aa750d9c9154921623efe532950bbf65e4b0fed042c8683171f5a
-
SHA512
28f2ed956bd7e45a61f7fec8461458a37e3a6baad807d7fbad32fd3d3bbe5cbb7b4a22921516969b22360e5ecfc7d6c746a8e6678e0c3d4ec4dc6523f76c4b83
-
SSDEEP
6144:nnOsaQgAOjvrZFODJjBz3j1jTqQy6v2GGnugOtihzXRe:nnOflT/ZFIjBz3xjTxynGUOUhXRe
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation d206f398d6b06df7b65c5871145b5964.exe -
Executes dropped EXE 1 IoCs
pid Process 4428 hasfj.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4388 wrote to memory of 4428 4388 d206f398d6b06df7b65c5871145b5964.exe 83 PID 4388 wrote to memory of 4428 4388 d206f398d6b06df7b65c5871145b5964.exe 83 PID 4388 wrote to memory of 4428 4388 d206f398d6b06df7b65c5871145b5964.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\d206f398d6b06df7b65c5871145b5964.exe"C:\Users\Admin\AppData\Local\Temp\d206f398d6b06df7b65c5871145b5964.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
PID:4428
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
391KB
MD5612d0bd062e5ef1945236c52de3f32cc
SHA13a5c0217ed3b0d44dffd968a9dba580ed8deb3b6
SHA256a0a71ac876d52dca4f4b11846011414cbebec3f4e6cc41ca1dd3272ce3d0cdc7
SHA512a99a7e07dd3fba06c370d2331e6ade8517f7b0c17d7352ac249e9dbec7bde1e347ccad39edfb88c2dc29a5723f33f699afd97ff2422c9aaa838c0b2fcffdbaf5