Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
94s -
max time network
115s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02/08/2024, 22:05
Behavioral task
behavioral1
Sample
0ba81c0da14a6a9709d8574acb532110N.exe
Resource
win7-20240729-en
General
-
Target
0ba81c0da14a6a9709d8574acb532110N.exe
-
Size
59KB
-
MD5
0ba81c0da14a6a9709d8574acb532110
-
SHA1
bb69cadfc6ceab7d9813809325bc115f3673ed92
-
SHA256
b1ed451db3b86a45bcc48c00fda33d242338c8c65004caa6bf4e807187249e4b
-
SHA512
526666fe72bd15ba8ef23ec739af0776ea665d13e887c9e3c63b2826f0c6cfc07cfaa7ecc8094be9028d5b2ba0e8ef4b60721c9524f080071ea219ee0185fa61
-
SSDEEP
768:r8eRH+MlFh0pDpuJ84WEi+U6sh7iQroCHmyf+RjFBSuB2Xpfs1v1:r9l+W8xFt6sh7iQroCoRB0u0sN1
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation 0ba81c0da14a6a9709d8574acb532110N.exe -
Executes dropped EXE 1 IoCs
pid Process 3468 bkgrnd.exe -
resource yara_rule behavioral2/memory/4760-0-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral2/files/0x00090000000233ff-7.dat upx behavioral2/memory/4760-11-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral2/memory/3468-18-0x0000000000400000-0x000000000040F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0ba81c0da14a6a9709d8574acb532110N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bkgrnd.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4760 wrote to memory of 3468 4760 0ba81c0da14a6a9709d8574acb532110N.exe 79 PID 4760 wrote to memory of 3468 4760 0ba81c0da14a6a9709d8574acb532110N.exe 79 PID 4760 wrote to memory of 3468 4760 0ba81c0da14a6a9709d8574acb532110N.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ba81c0da14a6a9709d8574acb532110N.exe"C:\Users\Admin\AppData\Local\Temp\0ba81c0da14a6a9709d8574acb532110N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Users\Admin\AppData\Local\Temp\bkgrnd.exe"C:\Users\Admin\AppData\Local\Temp\bkgrnd.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3468
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
59KB
MD50d86869768751b06397e38204ba9e8b6
SHA14d0862bdeebb1429f5da0438934fe9334fa68e59
SHA25638f45b293c0e5c2f3bd22046547c06b053938d0e0bf2f8df939c824937937099
SHA51246144f39536e619073489e8e1f64b7be3a4e59697c1c4042310090b9b701f0d096dc7490218a07cffde94ffeddb3ee600b3eaa85bfd8fad71456220a4dffad45