Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
14/06/2024, 01:44
Static task
static1
Behavioral task
behavioral1
Sample
Driver_Daruma_S700.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
Driver_Daruma_S700.exe
Resource
win10v2004-20240508-en
General
-
Target
Driver_Daruma_S700.exe
-
Size
2.9MB
-
MD5
1cfce8394154d228e41ad27c6f7c95b1
-
SHA1
8327060ec76507d23310a2c5d5e13754d8fbf3b3
-
SHA256
c40a8fc908bde7b50e0c2ba23b777dc5fa7eb443db08566cc36ef1576dcbf06b
-
SHA512
d916dd5d11b43683cad0410f450bd9444fa7f15e2a75134c466e1722d0248a29d2373a2686075c300e614b969f9862c78627df1c4a876ecd97eb5703c23cd1ed
-
SSDEEP
49152:uySX1qHfDjV5TZDCilpuPLwkJIF6ur6540W5/2pU79RhdTz07shjRhGPSWxldQOX:u51q/DH1DVlpCTJII6926DTzJjRhGlik
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Driver_Daruma_S700.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3788 wrote to memory of 2140 3788 Driver_Daruma_S700.exe 86 PID 3788 wrote to memory of 2140 3788 Driver_Daruma_S700.exe 86 PID 3788 wrote to memory of 2140 3788 Driver_Daruma_S700.exe 86 PID 2140 wrote to memory of 3772 2140 cmd.exe 89 PID 2140 wrote to memory of 3772 2140 cmd.exe 89 PID 2140 wrote to memory of 3772 2140 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\Driver_Daruma_S700.exe"C:\Users\Admin\AppData\Local\Temp\Driver_Daruma_S700.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3788 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\6A14.tmp\Driver_Daruma_S700.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ver3⤵PID:3772
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD53e6f710620cba8fc05181014eccd6b2e
SHA18350ecb30dbf454dd273d76fb6085bc40c3b3e27
SHA2562332e623a7d0195c12650164b96df18e11329e415751412c537987308362b9fd
SHA512766fef8bb3d389cc9662d60c8ef02d17295c917edda36cc98ccb51640ac4d212bc562abd7f912259272dae21ebcf0106fddc8545dd4bb5c06934e84ae819f228