Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/07/2024, 07:24

General

  • Target

    f2a6cbf1946365978eed4bbb5d34970a6933e04034fcbf32f5bd76ff39231622.exe

  • Size

    29KB

  • MD5

    87eac925801bd9819d91eb39133fe001

  • SHA1

    748f0b0626667268eb7a0f4bc38ec7a61b2e0ec6

  • SHA256

    f2a6cbf1946365978eed4bbb5d34970a6933e04034fcbf32f5bd76ff39231622

  • SHA512

    f1d809a24102082d63bc8e61ea533af6310a5ed11be68e2e61a7f4e7a16add47f614180c14c9487b3ae3d417f83d18e003142a330df307169c222d44db188f30

  • SSDEEP

    384:dUJ8s1g8ssAi6D9VIt13vfdHldhwLGEGi+OGa0Mr8SmM:SasbLAiict13vfdHldhwyEr+OGa0MrV

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f2a6cbf1946365978eed4bbb5d34970a6933e04034fcbf32f5bd76ff39231622.exe
    "C:\Users\Admin\AppData\Local\Temp\f2a6cbf1946365978eed4bbb5d34970a6933e04034fcbf32f5bd76ff39231622.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1976
    • C:\Users\Admin\AppData\Local\Temp\ppl32.exe
      "C:\Users\Admin\AppData\Local\Temp\ppl32.exe"
      2⤵
      • Executes dropped EXE
      PID:1924

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\ppl32.exe

    Filesize

    29KB

    MD5

    3cc5c96645290cc6dc3f42917e5de4f6

    SHA1

    c20d681c6438b717380673fc789c7c7d1fb92643

    SHA256

    05c57099c1f1a43131f1909e2c022f2ca61abd154aa5f6de473e729ce411fbeb

    SHA512

    c4def095f29f7c118d5808f14906aab9d6c62f8c2e76de0d13032e6a62b327c372df8579d4496b10cf85b2768ffbc786afec9fb95bb6677ec83473fbccd21011

  • memory/1924-24-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1924-23-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1924-27-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1924-28-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1976-0-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/1976-1-0x00000000004E0000-0x00000000004EA000-memory.dmp

    Filesize

    40KB

  • memory/1976-2-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB