Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
112s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
21/07/2024, 14:04
Static task
static1
Behavioral task
behavioral1
Sample
d1effbadf0412e266731e04d3188a620N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
d1effbadf0412e266731e04d3188a620N.exe
Resource
win10v2004-20240709-en
General
-
Target
d1effbadf0412e266731e04d3188a620N.exe
-
Size
32KB
-
MD5
d1effbadf0412e266731e04d3188a620
-
SHA1
63732a28ca8036c341cc1e098d3edf8535f5140c
-
SHA256
28dde26b7160e48cc45f4051d9f8bfaa63b15e7343eb6b87d3c70505cc2e2a59
-
SHA512
98e6b60f6098de1559882a08441942e63a50bce2e21b010c189240c1c80ed5c8d4d3e35455077393a53d6d173aa901c1d9895807e9954bd9f3af817495464418
-
SSDEEP
384:fY/7iMmQgVC+02JWuCSPmSQTebw/UqFPpF5bGwpUZyjAEbjS7DFHvYin:y12JTPRQTeZq1bUWQD1Qin
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation d1effbadf0412e266731e04d3188a620N.exe -
Executes dropped EXE 1 IoCs
pid Process 4668 budha.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2268 wrote to memory of 4668 2268 d1effbadf0412e266731e04d3188a620N.exe 85 PID 2268 wrote to memory of 4668 2268 d1effbadf0412e266731e04d3188a620N.exe 85 PID 2268 wrote to memory of 4668 2268 d1effbadf0412e266731e04d3188a620N.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\d1effbadf0412e266731e04d3188a620N.exe"C:\Users\Admin\AppData\Local\Temp\d1effbadf0412e266731e04d3188a620N.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\budha.exe"C:\Users\Admin\AppData\Local\Temp\budha.exe"2⤵
- Executes dropped EXE
PID:4668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD5369aec644defb2a3974e0e038111aa7c
SHA1b85a725943d471b3de2ab9cfdb41f4e6f1ae4c10
SHA256d4e31b9883d02e41c7cd907955f564d51bee8ceb3b2a27883216d4d76f7e9360
SHA5125f2eeb79fec6ea0da8fa29d8595a375d309d9cb9c881f10cdb96ff7538e422360eb058a8ce7fad30a6f6eb911b701110191c9f60bf3d9e44282c258dd55325e1