Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27/07/2024, 10:10
Static task
static1
Behavioral task
behavioral1
Sample
b4be4dd9b085ff32b35e9374254ba530N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b4be4dd9b085ff32b35e9374254ba530N.exe
Resource
win10v2004-20240709-en
General
-
Target
b4be4dd9b085ff32b35e9374254ba530N.exe
-
Size
394KB
-
MD5
b4be4dd9b085ff32b35e9374254ba530
-
SHA1
22a4d1cdda00ab4ce9b67c04366eaef9be06d08f
-
SHA256
8868a7cc9adfec0c694a21b87cf43db6cbd5a8cc8a923b662d19b653a524124e
-
SHA512
301cc249310c06545bff12f5f0c60d0c051fde35834d9eb3c235b5f1374dfcb83e46fc74ee8ba02e22b78c281b90f61bed01107ebc39b65fa29eae19f810993c
-
SSDEEP
6144:38ASJKenie2xT2NU2OTFQb8Fb0I1UfFmPGL:3A5nilTFQbI0a+GGL
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Control Panel\International\Geo\Nation b4be4dd9b085ff32b35e9374254ba530N.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\IntelPowerAgent8 = "rundll32.exe shell32.dll, ShellExec_RunDLL C:\\PROGRA~3\\DH6FH6~1.EXE" svchost.exe -
Checks for any installed AV software in registry 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Avira svchost.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\AVAST Software\Avast svchost.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Eset\Nod svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4592 set thread context of 2680 4592 b4be4dd9b085ff32b35e9374254ba530N.exe 87 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b4be4dd9b085ff32b35e9374254ba530N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 4592 wrote to memory of 2680 4592 b4be4dd9b085ff32b35e9374254ba530N.exe 87 PID 4592 wrote to memory of 2680 4592 b4be4dd9b085ff32b35e9374254ba530N.exe 87 PID 4592 wrote to memory of 2680 4592 b4be4dd9b085ff32b35e9374254ba530N.exe 87 PID 4592 wrote to memory of 2680 4592 b4be4dd9b085ff32b35e9374254ba530N.exe 87 PID 4592 wrote to memory of 2680 4592 b4be4dd9b085ff32b35e9374254ba530N.exe 87 PID 4592 wrote to memory of 2680 4592 b4be4dd9b085ff32b35e9374254ba530N.exe 87 PID 4592 wrote to memory of 2680 4592 b4be4dd9b085ff32b35e9374254ba530N.exe 87 PID 4592 wrote to memory of 2680 4592 b4be4dd9b085ff32b35e9374254ba530N.exe 87 PID 4592 wrote to memory of 2680 4592 b4be4dd9b085ff32b35e9374254ba530N.exe 87 PID 4592 wrote to memory of 2680 4592 b4be4dd9b085ff32b35e9374254ba530N.exe 87 PID 4592 wrote to memory of 2680 4592 b4be4dd9b085ff32b35e9374254ba530N.exe 87 PID 2680 wrote to memory of 4592 2680 svchost.exe 83 PID 2680 wrote to memory of 4592 2680 svchost.exe 83 PID 2680 wrote to memory of 4592 2680 svchost.exe 83 PID 2680 wrote to memory of 4592 2680 svchost.exe 83 PID 2680 wrote to memory of 4592 2680 svchost.exe 83 PID 2680 wrote to memory of 4592 2680 svchost.exe 83 PID 2680 wrote to memory of 4592 2680 svchost.exe 83 PID 4592 wrote to memory of 1632 4592 b4be4dd9b085ff32b35e9374254ba530N.exe 88 PID 4592 wrote to memory of 1632 4592 b4be4dd9b085ff32b35e9374254ba530N.exe 88 PID 4592 wrote to memory of 1632 4592 b4be4dd9b085ff32b35e9374254ba530N.exe 88 PID 2680 wrote to memory of 1632 2680 svchost.exe 88 PID 2680 wrote to memory of 1632 2680 svchost.exe 88 PID 2680 wrote to memory of 1632 2680 svchost.exe 88 PID 2680 wrote to memory of 1632 2680 svchost.exe 88 PID 2680 wrote to memory of 1632 2680 svchost.exe 88 PID 2680 wrote to memory of 1632 2680 svchost.exe 88 PID 2680 wrote to memory of 1632 2680 svchost.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\b4be4dd9b085ff32b35e9374254ba530N.exe"C:\Users\Admin\AppData\Local\Temp\b4be4dd9b085ff32b35e9374254ba530N.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Windows\SysWOW64\svchost.exeC:\ProgramData\dh6fh6bbh4.exe2⤵
- Adds Run key to start application
- Checks for any installed AV software in registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2680
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\gxh12B3.tmp.bat" "C:\Users\Admin\AppData\Local\Temp\b4be4dd9b085ff32b35e9374254ba530N.exe""2⤵
- System Location Discovery: System Language Discovery
PID:1632
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37B
MD50848f7746133ad60525aa8c314806ce6
SHA1406d673cbf93e175d15b0cd3283c055d814730c7
SHA2564014ed4e96007190a81c42a8321618d345d9978c7459eda139a1cf4f242a5b20
SHA512d4dec8278d99a6d6718c47b22a71bd8699399c0216c47e206a1e534bf3c10e0e9385528442c8ff6f98c467ec3ceea66f6e20f790eae65f4ee3ceb5db190f1878