Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
52s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24/06/2024, 00:17
Static task
static1
Behavioral task
behavioral1
Sample
ta4073.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
ta4073.exe
Resource
win10v2004-20240508-en
General
-
Target
ta4073.exe
-
Size
25.8MB
-
MD5
15ecc8ba9811b8e5bd9d868b213a2182
-
SHA1
b221004e3ac301e686a02f9c7667cf2c85276c65
-
SHA256
87bc71b36b242a954f6dac19f466de0944becce465b37825552c1ba9703a19a8
-
SHA512
88d1518444f53b1a555ab52b97821ac594a2b6f3c78acb8c04798e26d1c5b3eb84af86e5707f45cfc61bf147de05a7e9eab9bc7e406c79290bb4692174012fd5
-
SSDEEP
786432:xkCG+BZo4femcZvQEqe1aecl5OzvUme1g6fJ3t:xk+BZo4fexQyvcl5OzAfh9
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation ta4073.exe -
Executes dropped EXE 2 IoCs
pid Process 2184 NextUpTA4Installer.exe 3368 NextUpTA4Installer.tmp -
Loads dropped DLL 3 IoCs
pid Process 3368 NextUpTA4Installer.tmp 3368 NextUpTA4Installer.tmp 3368 NextUpTA4Installer.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 620 wrote to memory of 2184 620 ta4073.exe 82 PID 620 wrote to memory of 2184 620 ta4073.exe 82 PID 620 wrote to memory of 2184 620 ta4073.exe 82 PID 2184 wrote to memory of 3368 2184 NextUpTA4Installer.exe 83 PID 2184 wrote to memory of 3368 2184 NextUpTA4Installer.exe 83 PID 2184 wrote to memory of 3368 2184 NextUpTA4Installer.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\ta4073.exe"C:\Users\Admin\AppData\Local\Temp\ta4073.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Users\Admin\AppData\Local\Temp\TextAloud\NextUpTA4Installer.exe"C:\Users\Admin\AppData\Local\Temp\TextAloud\NextUpTA4Installer.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\is-HI3KV.tmp\NextUpTA4Installer.tmp"C:\Users\Admin\AppData\Local\Temp\is-HI3KV.tmp\NextUpTA4Installer.tmp" /SL5="$90054,24417821,57856,C:\Users\Admin\AppData\Local\Temp\TextAloud\NextUpTA4Installer.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3368
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23.6MB
MD5b2b3d7a79ce92eea03c5a11a6f3a4c61
SHA12c7a1b65fb2f3f3f1710e26434af8cc6ecaa39de
SHA2565c61e6b04a94a8af724500f062b2615818f3a24eab983977e50484742c7f0f57
SHA512dea97e4b83128ea4bd4b84e0b5658d5b60b716521aad80927f505c15c16b402f684cd98d994ca96536f9817f2795949a73da4ec977cbf1358912a648be694535
-
Filesize
2.1MB
MD5f79170750b22e2031592fbda6b16b3ca
SHA1d2e35403ed38111c09d3dbdd166459a954968ff9
SHA25676e86688b6d2bf3cbfb9bfe6661e9e93b4dd1aefe0c4d843081108648e66c962
SHA5122086c7197993b2978e3cd30cb0a2fd70e5b1346bb1bd58070bd7360afda605faa36528ed71d3f3486d7bdb4f0c50a8946e329d24ea5f79d5a2572d8dfd2b1d32
-
Filesize
216KB
MD58f995688085bced38ba7795f60a5e1d3
SHA15b1ad67a149c05c50d6e388527af5c8a0af4343a
SHA256203d7b61eac96de865ab3b586160e72c78d93ab5532b13d50ef27174126fd006
SHA512043d41947ab69fc9297dcb5ad238acc2c35250d1172869945ed1a56894c10f93855f0210cbca41ceee9efb55fd56a35a4ec03c77e252409edc64bfb5fb821c35
-
Filesize
708KB
MD5ae5108fec9e1c3da26674d02ecc76153
SHA11ddf0c8de4032a6f649eb2d824ec2c9756806e53
SHA2561d3e6c985ffb65f507795dc35beab5006121374a1a176d73abe7abf4505f1dfe
SHA512ca7fae476ada3ab002e4d6826e704dfc0db7899789715fbcf3c9674394855d68b57260899e6fd792b8fc61a9e1fc22b0058335cac38a23c8f725c50d1baf9708