Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    108s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/07/2024, 01:21

General

  • Target

    47ccff97d013267a409934221107de80N.exe

  • Size

    179KB

  • MD5

    47ccff97d013267a409934221107de80

  • SHA1

    7dcf133b3fa675d6f0b564f26e3e5115e8ca2f2b

  • SHA256

    47325afa530e83455f846b753a910b80e6fad4a505ff996d6e8809b5f1bc4357

  • SHA512

    11a88b8dae1c73f55b118960bd2176802be0d191f12895cdfc50c7001d24770b6e1a56002c0b097cf378fe17a09863b2252ffdae945f3c0f508258009d23b652

  • SSDEEP

    3072:QXTTASJKf2n5AxE2NpxOa2XdU2QF4s5XgIDFyHb8kHofL/09rGB:QvASJKenie2xT2NU2OTFQb8Fb0IB

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks for any installed AV software in registry 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\47ccff97d013267a409934221107de80N.exe
    "C:\Users\Admin\AppData\Local\Temp\47ccff97d013267a409934221107de80N.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1960
    • C:\Windows\SysWOW64\svchost.exe
      C:\ProgramData\2j6fb6f8f2.exe
      2⤵
      • Adds Run key to start application
      • Checks for any installed AV software in registry
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3628
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\ndd42CA.tmp.bat" "C:\Users\Admin\AppData\Local\Temp\47ccff97d013267a409934221107de80N.exe""
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4436

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\ndd42CA.tmp.bat

    Filesize

    36B

    MD5

    491e9e77eabcfd29c6c12fb667a2fbfa

    SHA1

    050035bffd811af606555e840b23e726526e3c7a

    SHA256

    899d569bd73055d7f24cc87a17b84785ace35041d6bffa973a158d79cf8c30d3

    SHA512

    794c5c5139a00f15f30e7d236e575051c871b19ca74a4eb7d2ffca5cf125e8bae8280f92c94671efe31136b14f7587b505c1a5485797e043db43f700a58435b3

  • memory/1960-0-0x0000000000B00000-0x0000000000B30000-memory.dmp

    Filesize

    192KB

  • memory/1960-335-0x0000000003930000-0x00000000039A6000-memory.dmp

    Filesize

    472KB

  • memory/1960-336-0x0000000000B00000-0x0000000000B30000-memory.dmp

    Filesize

    192KB

  • memory/3628-281-0x00000000013D0000-0x0000000001446000-memory.dmp

    Filesize

    472KB

  • memory/3628-308-0x00000000013D0000-0x0000000001446000-memory.dmp

    Filesize

    472KB

  • memory/3628-286-0x00000000013D0000-0x0000000001446000-memory.dmp

    Filesize

    472KB

  • memory/3628-287-0x00000000013D0000-0x0000000001446000-memory.dmp

    Filesize

    472KB

  • memory/3628-291-0x00000000013D0000-0x0000000001446000-memory.dmp

    Filesize

    472KB

  • memory/3628-312-0x00000000013D0000-0x0000000001446000-memory.dmp

    Filesize

    472KB

  • memory/3628-309-0x0000000001000000-0x0000000001200000-memory.dmp

    Filesize

    2.0MB

  • memory/3628-284-0x00000000013D0000-0x0000000001446000-memory.dmp

    Filesize

    472KB

  • memory/3628-283-0x0000000001000000-0x0000000001200000-memory.dmp

    Filesize

    2.0MB

  • memory/3628-3-0x00000000013D0000-0x0000000001446000-memory.dmp

    Filesize

    472KB

  • memory/3628-2-0x0000000000BC0000-0x0000000000BC1000-memory.dmp

    Filesize

    4KB

  • memory/3628-338-0x00000000013D0000-0x0000000001446000-memory.dmp

    Filesize

    472KB

  • memory/3628-358-0x0000000001000000-0x0000000001200000-memory.dmp

    Filesize

    2.0MB

  • memory/3628-359-0x0000000001000000-0x0000000001200000-memory.dmp

    Filesize

    2.0MB