Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
111s -
max time network
116s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19/07/2024, 10:07
Static task
static1
Behavioral task
behavioral1
Sample
819082240cf061cbb6087df9de5b5740N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
819082240cf061cbb6087df9de5b5740N.exe
Resource
win10v2004-20240709-en
General
-
Target
819082240cf061cbb6087df9de5b5740N.exe
-
Size
51KB
-
MD5
819082240cf061cbb6087df9de5b5740
-
SHA1
fc578b57f3b0d335fc5ac20ece961a4ca1cd6c85
-
SHA256
8a2d96d459c226287efc0350fea606bdeede9a12543e95941fbe5abb47812e73
-
SHA512
2d0989039eb83457c9c7a2cc23b71691fff65eaceba4677448d0fc98699752dc00eec572687c66f530fa31ee1c4b5b3d2447bafbcfa146e1f1c783208f933e5e
-
SSDEEP
768:jvQ5qDLHRdw2iPSMEk/6KxPEMb960yXb8FfbbbPTTTY1111C:jvQoLHjw2iWPKxP7vyX4pbbbPTTTP
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation 819082240cf061cbb6087df9de5b5740N.exe -
Executes dropped EXE 1 IoCs
pid Process 1988 vgkhost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Debug\vgkhost.exe 819082240cf061cbb6087df9de5b5740N.exe File opened for modification C:\Windows\Debug\vgkhost.exe 819082240cf061cbb6087df9de5b5740N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2644 819082240cf061cbb6087df9de5b5740N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2644 wrote to memory of 3288 2644 819082240cf061cbb6087df9de5b5740N.exe 88 PID 2644 wrote to memory of 3288 2644 819082240cf061cbb6087df9de5b5740N.exe 88 PID 2644 wrote to memory of 3288 2644 819082240cf061cbb6087df9de5b5740N.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\819082240cf061cbb6087df9de5b5740N.exe"C:\Users\Admin\AppData\Local\Temp\819082240cf061cbb6087df9de5b5740N.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\819082~1.EXE > nul2⤵PID:3288
-
-
C:\Windows\Debug\vgkhost.exeC:\Windows\Debug\vgkhost.exe1⤵
- Executes dropped EXE
PID:1988
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
51KB
MD504c644e7a8e86dc3817b163e680a4998
SHA1f226f54cc3cdbd0b680a58707a237f4c19bbd55f
SHA25685896d26e86f2e491670b992f864fe2e5181715eb8653ed927c3dc6ab450d3e2
SHA51200e73864076c355919b5f80727d69b864a2dee0feb33fd926740f3d9628c6aa09de4feecdfbd693aefe70a3b1a2dc88f8a55835b7cb9039f7f7b7897e51ab709