Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
418s -
max time network
422s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
12/07/2024, 23:52
Behavioral task
behavioral1
Sample
GjIeRXj.exe
Resource
win10v2004-20240709-en
General
-
Target
GjIeRXj.exe
-
Size
9KB
-
MD5
672bb10a8b900749928a5dba1f30f505
-
SHA1
cf21194bf2ad984689eb4120f8a24e6821f7f4fa
-
SHA256
cc64a875031c75c7f20410d362651e4c886c2e12b13fd041dcf492471f8694ec
-
SHA512
19822e0154074d2264520edc472a32950648dafb4f269988bcd0e6dd1d22d302b9be744278277f5028bf3481037fa3a661594578a8a6c71317dc810cd3bb8bee
-
SSDEEP
192:P/J7CcaAtRdBzGkDbb5qZKFGbj+pFaNJhLkwcud2DH9VwGfctsuQP:B1FNkKymaNJawcudoD7UmHP
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation GjIeRXj.exe Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 1 IoCs
pid Process 2412 b2e.exe -
resource yara_rule behavioral1/memory/1240-0-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1240-11-0x0000000000400000-0x000000000040B000-memory.dmp upx -
pid Process 2700 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2700 powershell.exe 2700 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2700 powershell.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1240 wrote to memory of 2412 1240 GjIeRXj.exe 84 PID 1240 wrote to memory of 2412 1240 GjIeRXj.exe 84 PID 1240 wrote to memory of 2412 1240 GjIeRXj.exe 84 PID 2412 wrote to memory of 1444 2412 b2e.exe 86 PID 2412 wrote to memory of 1444 2412 b2e.exe 86 PID 2412 wrote to memory of 1444 2412 b2e.exe 86 PID 1444 wrote to memory of 224 1444 cmd.exe 90 PID 1444 wrote to memory of 224 1444 cmd.exe 90 PID 1444 wrote to memory of 224 1444 cmd.exe 90 PID 1444 wrote to memory of 2700 1444 cmd.exe 91 PID 1444 wrote to memory of 2700 1444 cmd.exe 91 PID 1444 wrote to memory of 2700 1444 cmd.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\GjIeRXj.exe"C:\Users\Admin\AppData\Local\Temp\GjIeRXj.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Users\Admin\AppData\Local\Temp\B769.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\B769.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\B769.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\GjIeRXj.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\B8D0.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Windows\SysWOW64\findstr.exefindstr /v "^;;;===,,," "C:\Users\Admin\AppData\Local\Temp\B8D0.tmp\batchfile.bat"4⤵PID:224
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exePowerShell.exe -ExecutionPolicy Bypass -Command "& 'C:\Users\Admin\AppData\Local\Temp\B8D0.tmp\ps.ps1'"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2700
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13KB
MD5b98952914563ae10d390dcf06eb435e4
SHA1f96fc1370bacb1d32b9b9c3c786a024c0ec4414d
SHA2561b4cd7f1798849c2d6f8b6527ed439f08d7d4834b54d48496403d8d3f1ae0fd1
SHA5123f4c871dc7aae92ec21523e4a825a4c4dfd3d99b99246c8c3c9f7e1243efa9cb29e75b3b31dfa3f1ce63175c6c27c1ea6cbfcf9596fb73dd63b4076ea6e68029
-
Filesize
4KB
MD53b0ade72d04f213270c57a5393588687
SHA1cf58e2d8bcbe5638c7d396ee82a2bb992b67516e
SHA2562744a7dc3b526f20b1553506e6d3076dfad30ab56309c7896d393686e38f1523
SHA5129b3bae372e77bc2236f750ea7f32ff9d2a6d047cb96c6af9a4a4b2b489d4700795350b52a337d14845d5aca25354dd997fe0d1176d3cc4006ae3de42ae635ffd
-
Filesize
4KB
MD5160c222cb06b996df28d277be301ed34
SHA16c7d58222cc005beca82597d9822a78bf6662d1e
SHA2565c68b2bdad8c2bb73e157ac247565f4baf5540f48e6b01371863d567275f1398
SHA512cd33be6ccc8933aa1f7b6c0bf4888c00990d894a392a15c979a8eedf9d67aa522d3cf78c4e110c41abc177fa5d0df79982bdebaeb7be5986ccac32a166340666
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82