Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27/07/2024, 05:08
Static task
static1
Behavioral task
behavioral1
Sample
9587bcbb93f8074e7777fc4a3bc73b90N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
9587bcbb93f8074e7777fc4a3bc73b90N.exe
Resource
win10v2004-20240709-en
General
-
Target
9587bcbb93f8074e7777fc4a3bc73b90N.exe
-
Size
912KB
-
MD5
9587bcbb93f8074e7777fc4a3bc73b90
-
SHA1
ed78248f2da2717b92fd75c8db36c1e7c2e7a75d
-
SHA256
5f55226ad993ca4941a48f970c36e64e0c6566b3c975e6f57898d59ee04eaea2
-
SHA512
0ae2c4407f31c65261170186adac5235580807074d905d222e0aac38d6ce28e6a67eededfff6c80552151ec15fb501e3dea3e7b254a3723003aa302d3aca692e
-
SSDEEP
12288:4jauDReWqM+rIoLf5Un3PzQtPk/teVt2/rkAHHQKGa+NR:4DD2oh3P8P8Euk0D9+NR
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4884 cbvbt.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\ProgramData\\cbvbt.exe" cbvbt.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9587bcbb93f8074e7777fc4a3bc73b90N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cbvbt.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5088 wrote to memory of 4884 5088 9587bcbb93f8074e7777fc4a3bc73b90N.exe 86 PID 5088 wrote to memory of 4884 5088 9587bcbb93f8074e7777fc4a3bc73b90N.exe 86 PID 5088 wrote to memory of 4884 5088 9587bcbb93f8074e7777fc4a3bc73b90N.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\9587bcbb93f8074e7777fc4a3bc73b90N.exe"C:\Users\Admin\AppData\Local\Temp\9587bcbb93f8074e7777fc4a3bc73b90N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\ProgramData\cbvbt.exe"C:\ProgramData\cbvbt.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4884
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
912KB
MD54a783ce5bb9102fa1a4fec61bc987011
SHA122dab82eb0fc7de7e28ca5163041d6bc5252002a
SHA256a180956d3819bd031d26b9ff0b4864fe38f333d56e35fb6c3927b4d32e36e228
SHA5122db940bf277b302c7eda1141c8d8c854c8487356dc095cac54b4acb35082b0852544857579a0c8a256afb4938f0217d0feb543a9f9538fdce90d97f35c749d4e
-
Filesize
136KB
MD5cb4c442a26bb46671c638c794bf535af
SHA18a742d0b372f2ddd2d1fdf688c3c4ac7f9272abf
SHA256f8d2c17bdf34ccfb58070ac8b131a8d95055340101a329f9a7212ac5240d0c25
SHA512074a31e8da403c0a718f93cbca50574d8b658921193db0e6e20eacd232379286f14a3698cd443dc740d324ad19d74934ae001a7ad64b88897d8afefbc9a3d4e3
-
Filesize
775KB
MD560d41214db27184f94f55e14d7bc32a2
SHA1e640b3895155261a98c5bed75dbef2e9d6fdca94
SHA256301d436786bb61bdb2c5ce9f76b8f4d20df4f365117765485a317e6040b59c6a
SHA512a25cb8ff9aa4fc2b9c3b4b708ca3d95ba22d5d276673dac9358b179d3dda6374bd5112b849d758b8bb38a4ce149e9d94d0305ccb9386739ffead3965eefd2408