Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
06/07/2024, 19:11
Static task
static1
Behavioral task
behavioral1
Sample
19d3824c60fc16430938c0120e39982093ac631570f2ed42d9cf1b738817c188.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
19d3824c60fc16430938c0120e39982093ac631570f2ed42d9cf1b738817c188.exe
Resource
win10v2004-20240704-en
General
-
Target
19d3824c60fc16430938c0120e39982093ac631570f2ed42d9cf1b738817c188.exe
-
Size
864KB
-
MD5
70b6803237853f5eb9a7aa1c3afdad7f
-
SHA1
93e79bed55e798e544b7554c820bf3e1fc1fcbed
-
SHA256
19d3824c60fc16430938c0120e39982093ac631570f2ed42d9cf1b738817c188
-
SHA512
47d7f8db39940d06520e889cbf10c926468d7799f1afdf4af0eb77cc106a600da918ff649223b5c0ec314ef19e757bf6777dbad3523c76cd4cc8b2034cb1e6b3
-
SSDEEP
12288:Zv1nWdQP1EDhZPxUTDYrGiVrzBrB8x4w6Ic7FQQN8e6yHI+1Dn+im49TOesj6DG3:Z9ndEVfUTpitz3FtFnNJ6m1jAes+DGL7
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-771719357-2485960699-3367710044-1000\Control Panel\International\Geo\Nation 19d3824c60fc16430938c0120e39982093ac631570f2ed42d9cf1b738817c188.exe -
Executes dropped EXE 3 IoCs
pid Process 388 Isass.exe 3744 IM_19d3824c60fc16430938c0120e39982093ac631570f2ed42d9cf1b738817c188.exe 1876 IM_19d3824c60fc16430938c0120e39982093ac631570f2ed42d9cf1b738817c188.exe -
Loads dropped DLL 1 IoCs
pid Process 1876 IM_19d3824c60fc16430938c0120e39982093ac631570f2ed42d9cf1b738817c188.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-771719357-2485960699-3367710044-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Isass.exe = "C:\\Program Files (x86)\\Microsoft Build\\Isass.exe" 19d3824c60fc16430938c0120e39982093ac631570f2ed42d9cf1b738817c188.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Isass.exe = "C:\\Program Files (x86)\\Microsoft Build\\Isass.exe" 19d3824c60fc16430938c0120e39982093ac631570f2ed42d9cf1b738817c188.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft Build\Isass.exe 19d3824c60fc16430938c0120e39982093ac631570f2ed42d9cf1b738817c188.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1244 19d3824c60fc16430938c0120e39982093ac631570f2ed42d9cf1b738817c188.exe 1244 19d3824c60fc16430938c0120e39982093ac631570f2ed42d9cf1b738817c188.exe 388 Isass.exe 388 Isass.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1244 wrote to memory of 388 1244 19d3824c60fc16430938c0120e39982093ac631570f2ed42d9cf1b738817c188.exe 83 PID 1244 wrote to memory of 388 1244 19d3824c60fc16430938c0120e39982093ac631570f2ed42d9cf1b738817c188.exe 83 PID 1244 wrote to memory of 388 1244 19d3824c60fc16430938c0120e39982093ac631570f2ed42d9cf1b738817c188.exe 83 PID 1244 wrote to memory of 3744 1244 19d3824c60fc16430938c0120e39982093ac631570f2ed42d9cf1b738817c188.exe 86 PID 1244 wrote to memory of 3744 1244 19d3824c60fc16430938c0120e39982093ac631570f2ed42d9cf1b738817c188.exe 86 PID 1244 wrote to memory of 3744 1244 19d3824c60fc16430938c0120e39982093ac631570f2ed42d9cf1b738817c188.exe 86 PID 3744 wrote to memory of 1876 3744 IM_19d3824c60fc16430938c0120e39982093ac631570f2ed42d9cf1b738817c188.exe 87 PID 3744 wrote to memory of 1876 3744 IM_19d3824c60fc16430938c0120e39982093ac631570f2ed42d9cf1b738817c188.exe 87 PID 3744 wrote to memory of 1876 3744 IM_19d3824c60fc16430938c0120e39982093ac631570f2ed42d9cf1b738817c188.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\19d3824c60fc16430938c0120e39982093ac631570f2ed42d9cf1b738817c188.exe"C:\Users\Admin\AppData\Local\Temp\19d3824c60fc16430938c0120e39982093ac631570f2ed42d9cf1b738817c188.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Program Files (x86)\Microsoft Build\Isass.exe"C:\Program Files (x86)\Microsoft Build\Isass.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:388
-
-
C:\Users\Admin\AppData\Local\Temp\IM_19d3824c60fc16430938c0120e39982093ac631570f2ed42d9cf1b738817c188.exe"C:\Users\Admin\AppData\Local\Temp\IM_19d3824c60fc16430938c0120e39982093ac631570f2ed42d9cf1b738817c188.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3744 -
C:\Windows\Temp\{D83734C7-C005-47D7-A745-B3478C643403}\.cr\IM_19d3824c60fc16430938c0120e39982093ac631570f2ed42d9cf1b738817c188.exe"C:\Windows\Temp\{D83734C7-C005-47D7-A745-B3478C643403}\.cr\IM_19d3824c60fc16430938c0120e39982093ac631570f2ed42d9cf1b738817c188.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\IM_19d3824c60fc16430938c0120e39982093ac631570f2ed42d9cf1b738817c188.exe" -burn.filehandle.attached=540 -burn.filehandle.self=6883⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1876
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
213KB
MD51566dec0c572f2818b31b7d4d92574d9
SHA126b2aa506dcd29aeeab19adec8de747931b62f41
SHA256d0e8aa26815914db1cbf88f6d31fe33a16323441a36636d6e4ef3b1531ad3dfb
SHA51213fb9370332a29836ae12b21afac038498c5242655fb9703f23fd21d86b95f099a3334e0c2d8dc2a86a2114ea3a919917f3f21d54ccecc10dfaf54eb4fd3ad5a
-
Filesize
6.9MB
MD5a68a9b8d0b55e8772ee4a782453491ae
SHA1440b0de1e2bb337f773b71f9807567bd87fcabac
SHA2564872c62938cb0bdd80f57468e889b3a7347ce894ab979af3e0dcacd8eb1ee415
SHA51208a10fcb4c12c388ee1ac960467c505c30f55a78ad2a4015b28ef3ea952298cca01487f83cc641cf45280dfb422de9476631e2c94af0ae9aad03ea14f7b2d02e
-
C:\Users\Admin\AppData\Local\Temp\IM_19d3824c60fc16430938c0120e39982093ac631570f2ed42d9cf1b738817c188.exe
Filesize611KB
MD5f128e3e0f84eccc3dbbdee42ff9435e1
SHA10b3dbe89c14dd81cce548104cf7b43b9d8fa8b52
SHA25610b3f98dd53d37a2b7f6ab31058a5c858b7ae1e845fd48aadbbec8da2d1239cd
SHA512eebd53e8261c568b0094da504315022bd6f020541c839e33d0351c224449162e0a592e4850aeb872fd639b4fd23c2b4c05c210f6672f5f4aeb94d4076b409eea
-
Filesize
4KB
MD59eb0320dfbf2bd541e6a55c01ddc9f20
SHA1eb282a66d29594346531b1ff886d455e1dcd6d99
SHA2569095bf7b6baa0107b40a4a6d727215be077133a190f4ca9bd89a176842141e79
SHA5129ada3a1757a493fbb004bd767fab8f77430af69d71479f340b8b8ede904cc94cd733700db593a4a2d2e1184c0081fd0648318d867128e1cb461021314990931d
-
Filesize
197KB
MD54356ee50f0b1a878e270614780ddf095
SHA1b5c0915f023b2e4ed3e122322abc40c4437909af
SHA25641a8787fdc9467f563438daba4131191aa1eb588a81beb9a89fe8bd886c16104
SHA512b9e482efe9189683dabfc9feff8b386d7eba4ecf070f42a1eebee6052cfb181a19497f831f1ea6429cfcce1d4865a5d279b24bd738d702902e9887bb9f0c4691