Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
08/07/2024, 02:20
Static task
static1
Behavioral task
behavioral1
Sample
19cc90d9c9205b2d568b41dec1bbf8a9.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
19cc90d9c9205b2d568b41dec1bbf8a9.exe
Resource
win10v2004-20240704-en
General
-
Target
19cc90d9c9205b2d568b41dec1bbf8a9.exe
-
Size
54KB
-
MD5
19cc90d9c9205b2d568b41dec1bbf8a9
-
SHA1
1f8e85298449f69c6db7cdae0bbe4a2530dd744e
-
SHA256
396c6fcfeec4ddd209cd77ad8f584de6faa905c12c6b1dff42d7c25c877be03f
-
SHA512
2417fc8a7be3966f920d8ca7bc74fd562aef1c9bdc522c0bb6335430a362a364bb6859e6b08ef910293f308a3e66f9dd054a5b2d4998f96505b37d31d5e3dfae
-
SSDEEP
768:X6LsoEEeegiZPvEhHSG+gp/BtOOtEvwDpjBVaD3E09vxmlcaTt:X6QFElP6n+gJBMOtEvwDpjBtExmlh
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\Control Panel\International\Geo\Nation 19cc90d9c9205b2d568b41dec1bbf8a9.exe -
Executes dropped EXE 1 IoCs
pid Process 524 asih.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3264 wrote to memory of 524 3264 19cc90d9c9205b2d568b41dec1bbf8a9.exe 85 PID 3264 wrote to memory of 524 3264 19cc90d9c9205b2d568b41dec1bbf8a9.exe 85 PID 3264 wrote to memory of 524 3264 19cc90d9c9205b2d568b41dec1bbf8a9.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\19cc90d9c9205b2d568b41dec1bbf8a9.exe"C:\Users\Admin\AppData\Local\Temp\19cc90d9c9205b2d568b41dec1bbf8a9.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3264 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:524
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
54KB
MD5ca90397ae99810c0ede3431fefce4dd0
SHA154b81e00cfbd3b2d200dd3f38c2dfc6df1ffab5f
SHA256fa23b9870b86739009b3bdfd973f6c527d48420a519e7726f7eef4e99c0c2270
SHA51254f87068cea370f4c338974bed438e26c80435def98d6a6b01fa1deefe22053b4086b3ce8f8f5592568d1d80a687c5112ffc9f90670b975855bc85634468c202