Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
51s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01/07/2024, 04:16
Static task
static1
Behavioral task
behavioral1
Sample
2f175dac5c8571e586722f6927b0112af22637a17efb3acfd78e813a804a38f8.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2f175dac5c8571e586722f6927b0112af22637a17efb3acfd78e813a804a38f8.exe
Resource
win10v2004-20240508-en
General
-
Target
2f175dac5c8571e586722f6927b0112af22637a17efb3acfd78e813a804a38f8.exe
-
Size
386KB
-
MD5
f9bb6ef02f29f52ff126279ff7d044bb
-
SHA1
5b68f1745d92d32a1e64ef3ace6640c5fbfeb254
-
SHA256
2f175dac5c8571e586722f6927b0112af22637a17efb3acfd78e813a804a38f8
-
SHA512
86a6c71dca30b5a6dc54cdc262318bbae1f16ba5f3e701d6d84adf8ddda265d178ddf7b72753e491a46d4fe043c2b7f9919f1be25a6f4fa0bc72ad193b0ca153
-
SSDEEP
3072:H1sSJApTSnQU/x0ImhuDzHfs4zbYOjujDRfygDgKQINXLLHIaKlay8weCycJ5DfS:H1sSmRIt/xhtsOju1DH5NXnIKAc
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2460 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 2f175dac5c8571e586722f6927b0112af22637a17efb3acfd78e813a804a38f8.exe -
Executes dropped EXE 2 IoCs
pid Process 2236 Svchost.exe 4748 System32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 4748 System32.exe 2460 powershell.exe 2460 powershell.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeDebugPrivilege 4748 System32.exe Token: SeIncreaseQuotaPrivilege 4748 System32.exe Token: SeSecurityPrivilege 4748 System32.exe Token: SeTakeOwnershipPrivilege 4748 System32.exe Token: SeLoadDriverPrivilege 4748 System32.exe Token: SeSystemProfilePrivilege 4748 System32.exe Token: SeSystemtimePrivilege 4748 System32.exe Token: SeProfSingleProcessPrivilege 4748 System32.exe Token: SeIncBasePriorityPrivilege 4748 System32.exe Token: SeCreatePagefilePrivilege 4748 System32.exe Token: SeBackupPrivilege 4748 System32.exe Token: SeRestorePrivilege 4748 System32.exe Token: SeShutdownPrivilege 4748 System32.exe Token: SeDebugPrivilege 4748 System32.exe Token: SeSystemEnvironmentPrivilege 4748 System32.exe Token: SeRemoteShutdownPrivilege 4748 System32.exe Token: SeUndockPrivilege 4748 System32.exe Token: SeManageVolumePrivilege 4748 System32.exe Token: 33 4748 System32.exe Token: 34 4748 System32.exe Token: 35 4748 System32.exe Token: 36 4748 System32.exe Token: SeDebugPrivilege 2460 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1148 wrote to memory of 2236 1148 2f175dac5c8571e586722f6927b0112af22637a17efb3acfd78e813a804a38f8.exe 82 PID 1148 wrote to memory of 2236 1148 2f175dac5c8571e586722f6927b0112af22637a17efb3acfd78e813a804a38f8.exe 82 PID 1148 wrote to memory of 4748 1148 2f175dac5c8571e586722f6927b0112af22637a17efb3acfd78e813a804a38f8.exe 83 PID 1148 wrote to memory of 4748 1148 2f175dac5c8571e586722f6927b0112af22637a17efb3acfd78e813a804a38f8.exe 83 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f175dac5c8571e586722f6927b0112af22637a17efb3acfd78e813a804a38f8.exe"C:\Users\Admin\AppData\Local\Temp\2f175dac5c8571e586722f6927b0112af22637a17efb3acfd78e813a804a38f8.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\ProgramData\Svchost.exe"C:\ProgramData\Svchost.exe"2⤵
- Executes dropped EXE
PID:2236
-
-
C:\ProgramData\System32.exe"C:\ProgramData\System32.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4748
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -WindowStyle Hidden -File C:\Users\Public\updates.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2460
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
326KB
MD5a844ac745a4005fbd3f51d79ff88583c
SHA192671774fd4be9781a77d2788a8dddbf8981ead5
SHA25674fe1a6a1e36be7d893e31bbb4d4bd83bf4b927e715276cd5607982139818ebd
SHA5125f0734058d9146ffeb552abf443df5097cf134a4737bed499467830e08d97f5d1996c1f1647c5c12289ca4d4209effd480010afebc59d50290d4ca7d45bb41f8
-
Filesize
330KB
MD5bdd3d30ea4bc94d1240ea75f1aa212eb
SHA1f994ffb94690263047c5227cc8b65d3ab3345ba7
SHA25600b7a0f1b18c5dd1f4d469a8c6997198fd7f471e94d6a6ba70d79fd165f44888
SHA5123a039b360581d7d2204dfff546d08b2a5ec36d78f9572730d9a707fe35925c8451d505fbb19f9c9d9861f3e5aea9ae4b52ae0031e109721d57f55a62b1b691b8
-
Filesize
51KB
MD5f52616c47b243f3373248ed2a5f49e1c
SHA1d601cad06d6ccb0e52dabe8d34ae5f1cfd463000
SHA2563b24abf5671a93c15eca052fd28555e561dfe625962b2dbe733d7f717467a3a8
SHA5129435df5be1594667eaa988115b8d712abb0766e0e90330d2fa99ce76cfdc6272cb65a6c922278bb265c8e2127e755f5aadbfa2481ee009f105ff222d12f07cc0
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
43KB
MD5d9a4b64d20c6860f12b6da0ecd53983a
SHA1b3e8c9479370807c009bfb8ba46566a3e3e0893d
SHA2562e5ddfeff91ad3ba0ea2446912cef3b7f2b905cb3eb9f3d3ea51f512a13b53ad
SHA51210afb3130e4fb0af1a4efb618ed70f017fde98091927dd23a82fb8c228ea78b1ea6b1b644e4c2d733e21d8f152ec89fac11938d1d9ec38558a8319922ee2e6b3