Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

12/07/2024, 23:52

240712-3wvgkaydqa 7

12/07/2024, 23:49

240712-3vepqawekn 8

Analysis

  • max time kernel
    418s
  • max time network
    422s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/07/2024, 23:52

General

  • Target

    GjIeRXj.exe

  • Size

    9KB

  • MD5

    672bb10a8b900749928a5dba1f30f505

  • SHA1

    cf21194bf2ad984689eb4120f8a24e6821f7f4fa

  • SHA256

    cc64a875031c75c7f20410d362651e4c886c2e12b13fd041dcf492471f8694ec

  • SHA512

    19822e0154074d2264520edc472a32950648dafb4f269988bcd0e6dd1d22d302b9be744278277f5028bf3481037fa3a661594578a8a6c71317dc810cd3bb8bee

  • SSDEEP

    192:P/J7CcaAtRdBzGkDbb5qZKFGbj+pFaNJhLkwcud2DH9VwGfctsuQP:B1FNkKymaNJawcudoD7UmHP

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\GjIeRXj.exe
    "C:\Users\Admin\AppData\Local\Temp\GjIeRXj.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1240
    • C:\Users\Admin\AppData\Local\Temp\B769.tmp\b2e.exe
      "C:\Users\Admin\AppData\Local\Temp\B769.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\B769.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\GjIeRXj.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2412
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\B8D0.tmp\batchfile.bat" "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1444
        • C:\Windows\SysWOW64\findstr.exe
          findstr /v "^;;;===,,," "C:\Users\Admin\AppData\Local\Temp\B8D0.tmp\batchfile.bat"
          4⤵
            PID:224
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            PowerShell.exe -ExecutionPolicy Bypass -Command "& 'C:\Users\Admin\AppData\Local\Temp\B8D0.tmp\ps.ps1'"
            4⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2700

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\B769.tmp\b2e.exe

      Filesize

      13KB

      MD5

      b98952914563ae10d390dcf06eb435e4

      SHA1

      f96fc1370bacb1d32b9b9c3c786a024c0ec4414d

      SHA256

      1b4cd7f1798849c2d6f8b6527ed439f08d7d4834b54d48496403d8d3f1ae0fd1

      SHA512

      3f4c871dc7aae92ec21523e4a825a4c4dfd3d99b99246c8c3c9f7e1243efa9cb29e75b3b31dfa3f1ce63175c6c27c1ea6cbfcf9596fb73dd63b4076ea6e68029

    • C:\Users\Admin\AppData\Local\Temp\B8D0.tmp\batchfile.bat

      Filesize

      4KB

      MD5

      3b0ade72d04f213270c57a5393588687

      SHA1

      cf58e2d8bcbe5638c7d396ee82a2bb992b67516e

      SHA256

      2744a7dc3b526f20b1553506e6d3076dfad30ab56309c7896d393686e38f1523

      SHA512

      9b3bae372e77bc2236f750ea7f32ff9d2a6d047cb96c6af9a4a4b2b489d4700795350b52a337d14845d5aca25354dd997fe0d1176d3cc4006ae3de42ae635ffd

    • C:\Users\Admin\AppData\Local\Temp\B8D0.tmp\ps.ps1

      Filesize

      4KB

      MD5

      160c222cb06b996df28d277be301ed34

      SHA1

      6c7d58222cc005beca82597d9822a78bf6662d1e

      SHA256

      5c68b2bdad8c2bb73e157ac247565f4baf5540f48e6b01371863d567275f1398

      SHA512

      cd33be6ccc8933aa1f7b6c0bf4888c00990d894a392a15c979a8eedf9d67aa522d3cf78c4e110c41abc177fa5d0df79982bdebaeb7be5986ccac32a166340666

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_roxmebdz.lje.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • memory/1240-11-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB

    • memory/1240-0-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB

    • memory/2412-8-0x0000000000400000-0x0000000000405000-memory.dmp

      Filesize

      20KB

    • memory/2412-80-0x0000000000400000-0x0000000000405000-memory.dmp

      Filesize

      20KB

    • memory/2700-40-0x0000000006FC0000-0x000000000705C000-memory.dmp

      Filesize

      624KB

    • memory/2700-54-0x0000000007260000-0x0000000007303000-memory.dmp

      Filesize

      652KB

    • memory/2700-22-0x0000000005540000-0x0000000005562000-memory.dmp

      Filesize

      136KB

    • memory/2700-23-0x00000000055E0000-0x0000000005646000-memory.dmp

      Filesize

      408KB

    • memory/2700-24-0x0000000005650000-0x00000000056B6000-memory.dmp

      Filesize

      408KB

    • memory/2700-20-0x0000000073D10000-0x00000000744C0000-memory.dmp

      Filesize

      7.7MB

    • memory/2700-34-0x0000000005700000-0x0000000005A54000-memory.dmp

      Filesize

      3.3MB

    • memory/2700-35-0x0000000005D00000-0x0000000005D1E000-memory.dmp

      Filesize

      120KB

    • memory/2700-36-0x0000000005D40000-0x0000000005D8C000-memory.dmp

      Filesize

      304KB

    • memory/2700-19-0x0000000004EE0000-0x0000000005508000-memory.dmp

      Filesize

      6.2MB

    • memory/2700-38-0x0000000007460000-0x0000000007ADA000-memory.dmp

      Filesize

      6.5MB

    • memory/2700-39-0x0000000006240000-0x000000000625A000-memory.dmp

      Filesize

      104KB

    • memory/2700-18-0x0000000002350000-0x0000000002386000-memory.dmp

      Filesize

      216KB

    • memory/2700-41-0x0000000006D80000-0x0000000006DB2000-memory.dmp

      Filesize

      200KB

    • memory/2700-42-0x00000000705A0000-0x00000000705EC000-memory.dmp

      Filesize

      304KB

    • memory/2700-43-0x0000000070710000-0x0000000070A64000-memory.dmp

      Filesize

      3.3MB

    • memory/2700-53-0x0000000006F20000-0x0000000006F3E000-memory.dmp

      Filesize

      120KB

    • memory/2700-21-0x0000000073D10000-0x00000000744C0000-memory.dmp

      Filesize

      7.7MB

    • memory/2700-55-0x0000000007330000-0x0000000007346000-memory.dmp

      Filesize

      88KB

    • memory/2700-56-0x0000000006F20000-0x0000000006F2A000-memory.dmp

      Filesize

      40KB

    • memory/2700-57-0x00000000073A0000-0x00000000073C6000-memory.dmp

      Filesize

      152KB

    • memory/2700-58-0x0000000008160000-0x0000000008704000-memory.dmp

      Filesize

      5.6MB

    • memory/2700-59-0x0000000007C50000-0x0000000007CE2000-memory.dmp

      Filesize

      584KB

    • memory/2700-60-0x0000000070710000-0x0000000070A64000-memory.dmp

      Filesize

      3.3MB

    • memory/2700-70-0x0000000007D90000-0x0000000007D9A000-memory.dmp

      Filesize

      40KB

    • memory/2700-71-0x0000000007EC0000-0x0000000007F56000-memory.dmp

      Filesize

      600KB

    • memory/2700-72-0x0000000007DC0000-0x0000000007DD1000-memory.dmp

      Filesize

      68KB

    • memory/2700-73-0x0000000007DF0000-0x0000000007DFE000-memory.dmp

      Filesize

      56KB

    • memory/2700-74-0x0000000007E20000-0x0000000007E34000-memory.dmp

      Filesize

      80KB

    • memory/2700-75-0x0000000007E60000-0x0000000007E7A000-memory.dmp

      Filesize

      104KB

    • memory/2700-76-0x0000000007E90000-0x0000000007E98000-memory.dmp

      Filesize

      32KB

    • memory/2700-79-0x0000000073D10000-0x00000000744C0000-memory.dmp

      Filesize

      7.7MB

    • memory/2700-17-0x0000000073D1E000-0x0000000073D1F000-memory.dmp

      Filesize

      4KB