Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
16/07/2024, 04:32
Static task
static1
Behavioral task
behavioral1
Sample
6b38761d5a52fe8a2675a182c88c41b0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6b38761d5a52fe8a2675a182c88c41b0N.exe
Resource
win10v2004-20240704-en
General
-
Target
6b38761d5a52fe8a2675a182c88c41b0N.exe
-
Size
43KB
-
MD5
6b38761d5a52fe8a2675a182c88c41b0
-
SHA1
3abc4cd180a1760ae10779a61f7b7f8fa9e598a5
-
SHA256
5ceea7fd6e8e32a06de99efd83a4095640aefdd9f6a7e15e08f83951e55ce670
-
SHA512
e0f50e28ec1576b123a5e17144903055b47603854d00713dbab04696482e68919f60b0df3598f3af5cb84f61187c62c475f2ce18fb268ef7ecf6689d54a8b1f8
-
SSDEEP
768:DaP8mckxIrafCtdgI2MyzNtRQtONlIwoHNV2XBFV72B4lA7cN5Ze6/OVgX5/ZMz:Da0mc7ufCtdgI2MyzNtRQtONlIwoHNV5
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation 6b38761d5a52fe8a2675a182c88c41b0N.exe -
Executes dropped EXE 1 IoCs
pid Process 4396 hhcbrnaff.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2304 wrote to memory of 4396 2304 6b38761d5a52fe8a2675a182c88c41b0N.exe 83 PID 2304 wrote to memory of 4396 2304 6b38761d5a52fe8a2675a182c88c41b0N.exe 83 PID 2304 wrote to memory of 4396 2304 6b38761d5a52fe8a2675a182c88c41b0N.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\6b38761d5a52fe8a2675a182c88c41b0N.exe"C:\Users\Admin\AppData\Local\Temp\6b38761d5a52fe8a2675a182c88c41b0N.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Users\Admin\AppData\Local\Temp\hhcbrnaff.exe"C:\Users\Admin\AppData\Local\Temp\hhcbrnaff.exe"2⤵
- Executes dropped EXE
PID:4396
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD5ecaf01944e5dcff42fbc96adc41f32b4
SHA1d08bc9f300cc4045452f05c2d03b6e73ff0cc1d2
SHA256bf3374ba6f83e4648c3b4c5e75765209608c0443f106bc16813bf53a49c8b927
SHA5124a18894c913eb7ee3a7766c822c6000b98c531483a00294b4ba97433ba8e135a6ddd751073206e0b1c07248693cb74734c9a16ae6da568993ef03ff1f9d758c7