Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
111s -
max time network
111s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
20/07/2024, 03:54
Behavioral task
behavioral1
Sample
46f0a706173f256cbe158d9ea7a3f510N.exe
Resource
win7-20240705-en
General
-
Target
46f0a706173f256cbe158d9ea7a3f510N.exe
-
Size
75KB
-
MD5
46f0a706173f256cbe158d9ea7a3f510
-
SHA1
33e59d81596646f1d4faa4ce660579041bcc2244
-
SHA256
ec19333b5f6e7c2768074af6f34239f59ddba604275a413418168016c85ca0a1
-
SHA512
0429340182ccafd613d257b37768e287507721d6f83398a8766f35abe6b04992897c038cdc56d00820d0e354bb14ee32c506357ebaa0a3b9bfa7a2f84bd06b9c
-
SSDEEP
1536:8AAbhIP83LNnouy88zJHNWnnn3CCCCrrDRNxUUUmBDdddd4:87hEUL1out8zdID1K
Malware Config
Signatures
-
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 5048 attrib.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation 46f0a706173f256cbe158d9ea7a3f510N.exe -
Executes dropped EXE 1 IoCs
pid Process 4324 akmhost.exe -
resource yara_rule behavioral2/memory/5084-0-0x0000000000400000-0x0000000000415000-memory.dmp upx behavioral2/files/0x00090000000233e1-3.dat upx behavioral2/memory/4324-5-0x0000000000400000-0x0000000000415000-memory.dmp upx behavioral2/memory/5084-7-0x0000000000400000-0x0000000000415000-memory.dmp upx behavioral2/memory/4324-8-0x0000000000400000-0x0000000000415000-memory.dmp upx behavioral2/memory/4324-14-0x0000000000400000-0x0000000000415000-memory.dmp upx behavioral2/memory/4324-17-0x0000000000400000-0x0000000000415000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\Debug\akmhost.exe 46f0a706173f256cbe158d9ea7a3f510N.exe File opened for modification C:\Windows\Debug\akmhost.exe attrib.exe File created C:\Windows\Debug\akmhost.exe 46f0a706173f256cbe158d9ea7a3f510N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 akmhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz akmhost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 5084 46f0a706173f256cbe158d9ea7a3f510N.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5084 wrote to memory of 5048 5084 46f0a706173f256cbe158d9ea7a3f510N.exe 84 PID 5084 wrote to memory of 5048 5084 46f0a706173f256cbe158d9ea7a3f510N.exe 84 PID 5084 wrote to memory of 5048 5084 46f0a706173f256cbe158d9ea7a3f510N.exe 84 PID 5084 wrote to memory of 2872 5084 46f0a706173f256cbe158d9ea7a3f510N.exe 90 PID 5084 wrote to memory of 2872 5084 46f0a706173f256cbe158d9ea7a3f510N.exe 90 PID 5084 wrote to memory of 2872 5084 46f0a706173f256cbe158d9ea7a3f510N.exe 90 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 5048 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\46f0a706173f256cbe158d9ea7a3f510N.exe"C:\Users\Admin\AppData\Local\Temp\46f0a706173f256cbe158d9ea7a3f510N.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Windows\SysWOW64\attrib.exeattrib +a +s +h +r C:\Windows\Debug\akmhost.exe2⤵
- Sets file to hidden
- Drops file in Windows directory
- Views/modifies file attributes
PID:5048
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\46F0A7~1.EXE > nul2⤵PID:2872
-
-
C:\Windows\Debug\akmhost.exeC:\Windows\Debug\akmhost.exe1⤵
- Executes dropped EXE
- Checks processor information in registry
PID:4324
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
75KB
MD57fcfe7ea3089124ed62a65a971d01edc
SHA1066a32cf5c69e02019d4c553ceafe2a04fec1cf4
SHA2564d4e64cbbd589092c3210d3699d3e162a15051aaab27f6905da6591473e7a574
SHA512ea5890c1edf82c569ebac2add9d73d182e54b39f6bca53163a38fd248f2439ea0883c529785eed56931d29cadbc79c50b53d2d7114ca51fba2d4b50fcf90bf53