Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
10/07/2024, 00:06
Static task
static1
Behavioral task
behavioral1
Sample
6630dc597492000e40fb1bbff37712ff3146080dff4d4c937bdd3d145b8b7843.exe
Resource
win10v2004-20240709-en
General
-
Target
6630dc597492000e40fb1bbff37712ff3146080dff4d4c937bdd3d145b8b7843.exe
-
Size
370KB
-
MD5
a580b91155c0870f7ff1e9dc0ee85328
-
SHA1
474b5b52d7ec66a6de7164d903275b4759851431
-
SHA256
6630dc597492000e40fb1bbff37712ff3146080dff4d4c937bdd3d145b8b7843
-
SHA512
04f20fab6d4ba08542a047988241e4b9d2b6c12a8f39b717973a5eb40c0b49c41ea06aeadc3bbd0abedb5090528ec7172cdb75e60ea863a44478f13f4bc7a68d
-
SSDEEP
6144:Sy5ngvXvVhXkqnmWuWxEIc9FXp/Q5owrHaLZUJp8TM:95ng/NhXbnmiEV9FZIYU7
Malware Config
Extracted
gcleaner
185.172.128.90
77.105.160.30
185.172.128.69
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation 6630dc597492000e40fb1bbff37712ff3146080dff4d4c937bdd3d145b8b7843.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4468 4596 WerFault.exe 79 -
Kills process with taskkill 1 IoCs
pid Process 368 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 368 taskkill.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4596 wrote to memory of 1548 4596 6630dc597492000e40fb1bbff37712ff3146080dff4d4c937bdd3d145b8b7843.exe 80 PID 4596 wrote to memory of 1548 4596 6630dc597492000e40fb1bbff37712ff3146080dff4d4c937bdd3d145b8b7843.exe 80 PID 4596 wrote to memory of 1548 4596 6630dc597492000e40fb1bbff37712ff3146080dff4d4c937bdd3d145b8b7843.exe 80 PID 1548 wrote to memory of 368 1548 cmd.exe 84 PID 1548 wrote to memory of 368 1548 cmd.exe 84 PID 1548 wrote to memory of 368 1548 cmd.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\6630dc597492000e40fb1bbff37712ff3146080dff4d4c937bdd3d145b8b7843.exe"C:\Users\Admin\AppData\Local\Temp\6630dc597492000e40fb1bbff37712ff3146080dff4d4c937bdd3d145b8b7843.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "6630dc597492000e40fb1bbff37712ff3146080dff4d4c937bdd3d145b8b7843.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\6630dc597492000e40fb1bbff37712ff3146080dff4d4c937bdd3d145b8b7843.exe" & exit2⤵
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "6630dc597492000e40fb1bbff37712ff3146080dff4d4c937bdd3d145b8b7843.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:368
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4596 -s 14802⤵
- Program crash
PID:4468
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4596 -ip 45961⤵PID:2820