Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
35s -
max time network
37s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
29/06/2024, 21:07
Static task
static1
Behavioral task
behavioral1
Sample
AetherEye.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
Guna.UI2.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
Memory.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
config.ini
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
updater.exe
Resource
win10v2004-20240611-en
General
-
Target
updater.exe
-
Size
403KB
-
MD5
bcc3ac517a3b3b10c8f05686930af54d
-
SHA1
2626ce3b2a8d9916c6e836a06ee6ec8dd73466d5
-
SHA256
a32bd3681eea3853c1c86d19f1825891e9a38f06beeadc1053da9a6528d490da
-
SHA512
83b5435edf26eaf8de431b38ab4ada2d134a71c0b902958a1fd10c972e00db45b55c37a7f04026c295ad532949692d9b8d305ee1a474d1eb50dda6c40793743e
-
SSDEEP
12288:EVfYHN3FPGcgtn/WnGxGu7LM7JmgNFxovmAx0iqTe:cml0Rx/nxYboF0iqTe
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\Control Panel\International\Geo\Nation updater.exe -
Executes dropped EXE 1 IoCs
pid Process 752 AetherEye.exe -
Loads dropped DLL 2 IoCs
pid Process 752 AetherEye.exe 752 AetherEye.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 2620 752 WerFault.exe 88 800 752 WerFault.exe 88 -
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 752 AetherEye.exe 752 AetherEye.exe 752 AetherEye.exe 752 AetherEye.exe 752 AetherEye.exe 752 AetherEye.exe 752 AetherEye.exe 752 AetherEye.exe 752 AetherEye.exe 752 AetherEye.exe 752 AetherEye.exe 752 AetherEye.exe 752 AetherEye.exe 752 AetherEye.exe 752 AetherEye.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4572 updater.exe Token: SeDebugPrivilege 752 AetherEye.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4572 wrote to memory of 752 4572 updater.exe 88 PID 4572 wrote to memory of 752 4572 updater.exe 88 PID 4572 wrote to memory of 752 4572 updater.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\updater.exe"C:\Users\Admin\AppData\Local\Temp\updater.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Users\Admin\AppData\Local\Temp\AetherEye.exe"C:\Users\Admin\AppData\Local\Temp\AetherEye.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:752 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 752 -s 13403⤵
- Program crash
PID:2620
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 752 -s 13403⤵
- Program crash
PID:800
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 200 -p 752 -ip 7521⤵PID:3596
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 752 -ip 7521⤵PID:2680
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
49.5MB
MD5e2fc811079c8e2649c4318889eb56acb
SHA1773f4dd8de8de39f561b6ab36ecbefb1b2ed5a36
SHA25622e7389928dc9eb667d631cabd47a829fdcc754dd8a2c00d48aa32fb44de3f3b
SHA51276889142669c00c3537654f030d41f66135136690a615ccede01adf3f85524832ff61ad7bc8a8d17acb562d121a19017c867c79eea2e670e5b3b8153d2f5dc69
-
Filesize
82KB
MD53956130e36754f184a0443c850f708f8
SHA14874cd51b0fa5652ed84e3b0c123bee05dcdffc8
SHA25625c39f91f737d80040c72c9e3f95db0fece1c9653f501828adc16cfb1ec59d26
SHA512157143dd69378e9914ddbb934229cfbc99ae7d80f4f787b7799fc254054d2c7b1e6f4551cddea30470e28b61309f858fcdb2d009b1c32953dfe5ea7fe78e9e48
-
Filesize
118B
MD5b97045084cd2d1b66647eb380583f05f
SHA122b71f9168502279f3e7c6486bf1626c1d0fdbd5
SHA25632f8e6f59328ff2a3d398e39df1dd193b7f251372c9e261f0b18af4f88600ee8
SHA5128fc2b655acc6a8e52211ab948f6877e21807346a73b4e5c5b5906b718c6aa4a93d8971f9c43ae3beb99833806f2392624f3530482ac69dd841cb3fabd0332c0c
-
Filesize
117B
MD57cb0f541ef86dd9446924183a12baed9
SHA18aac7cd7d862f956d6dcb6893c73fd69ea543f19
SHA2567088f3e9cf86fcd1670b3e8ff02ea449f06865927919c4a8d0a2f0e5cd32960c
SHA512931fc5478549bd9ac6c8412ead72fcd23c0bc7a544c047c45f35e83ddcf88b3bb9d4f560145e0b47c8e7b56be2dc9ce96b9246abd8ebc599c9d1236ec1790db1
-
Filesize
118B
MD5d4a69d8cc2dc731896ec4b61564c0b3a
SHA1a110aa88bd332af2687c08a34c7d044e7b93720e
SHA2560426de20ccf077d1ac428c5d64b3ddb50d12d7b2a0eaa48486d809017f65106b
SHA512874300b8b820d132f36c3ae842b81477b1ef9c6c77538e8becf0a2c397b1ab2b3f8a68183ffd4b0b9aaa991075ee9f569346911a5d33af0e5aa15d59f1c75826