Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    103s
  • max time network
    104s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240730-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/08/2024, 10:14

General

  • Target

    8d45d4a6c47ab63ff6d8406ef3b51f00N.exe

  • Size

    490KB

  • MD5

    8d45d4a6c47ab63ff6d8406ef3b51f00

  • SHA1

    fd3e789930abe7fb3d19555d2fd98be8cf9f39d7

  • SHA256

    a8462d86259376aaff500ac50dfbc31caf8bf10ae0313403425957f6d635f300

  • SHA512

    506ab245b727b07c79238530a2ee31fd88ce35c2b19a6d75cd7f4e216bb3f9f630753cce150850da8268b3d2efa1d247eb1223b65bdf6b4f6db47fd217950eaf

  • SSDEEP

    12288:U+TRL7A0wg5rYzCm4juSIBS2RVFW4P6gr646b19mmVj:U+17A0wRs92V1By6mVj

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8d45d4a6c47ab63ff6d8406ef3b51f00N.exe
    "C:\Users\Admin\AppData\Local\Temp\8d45d4a6c47ab63ff6d8406ef3b51f00N.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3412
    • C:\Users\Admin\AppData\Local\Temp\n6323\s6323.exe
      "C:\Users\Admin\AppData\Local\Temp\n6323\s6323.exe" ins.exe /e12386661 /u52fe2c91-49dc-40b7-b209-1f140a000013
      2⤵
      • Executes dropped EXE
      • Drops desktop.ini file(s)
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:4380
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3412 -s 4472
      2⤵
      • Program crash
      PID:3172
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3412 -ip 3412
    1⤵
      PID:3576

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\n6323\s6323.exe

      Filesize

      269KB

      MD5

      ad76cab590ec4c1d3008589d2d2eb052

      SHA1

      3fd9b837fd4a078411c0958a41b1adb321e1016a

      SHA256

      a2111f7d4b36800e840b63573fcb044ea18fb4bc3fef2b8f2724d0d4b5e6c51a

      SHA512

      b8f6695a4c4c18046fb3da55f5c6d1fd60b4e90d8952bceb27296da1a522a97a829494bab103375595a599c602d337926270f2422401678af8d5393490e53432

    • memory/4380-11-0x00007FFA02B35000-0x00007FFA02B36000-memory.dmp

      Filesize

      4KB

    • memory/4380-12-0x00007FFA02880000-0x00007FFA03221000-memory.dmp

      Filesize

      9.6MB

    • memory/4380-14-0x0000000001AA0000-0x0000000001AAA000-memory.dmp

      Filesize

      40KB

    • memory/4380-13-0x00007FFA02880000-0x00007FFA03221000-memory.dmp

      Filesize

      9.6MB

    • memory/4380-17-0x000000001C6E0000-0x000000001CBAE000-memory.dmp

      Filesize

      4.8MB

    • memory/4380-18-0x000000001CC50000-0x000000001CCEC000-memory.dmp

      Filesize

      624KB

    • memory/4380-19-0x0000000001A80000-0x0000000001A88000-memory.dmp

      Filesize

      32KB

    • memory/4380-20-0x00007FFA02880000-0x00007FFA03221000-memory.dmp

      Filesize

      9.6MB

    • memory/4380-21-0x00007FFA02880000-0x00007FFA03221000-memory.dmp

      Filesize

      9.6MB

    • memory/4380-22-0x00007FFA02880000-0x00007FFA03221000-memory.dmp

      Filesize

      9.6MB

    • memory/4380-23-0x00007FFA02880000-0x00007FFA03221000-memory.dmp

      Filesize

      9.6MB

    • memory/4380-24-0x00000000204F0000-0x0000000020552000-memory.dmp

      Filesize

      392KB

    • memory/4380-25-0x0000000020B70000-0x0000000020CAC000-memory.dmp

      Filesize

      1.2MB

    • memory/4380-26-0x00000000211C0000-0x00000000216CE000-memory.dmp

      Filesize

      5.1MB

    • memory/4380-27-0x00007FFA02880000-0x00007FFA03221000-memory.dmp

      Filesize

      9.6MB

    • memory/4380-28-0x00007FFA02B35000-0x00007FFA02B36000-memory.dmp

      Filesize

      4KB

    • memory/4380-29-0x00007FFA02880000-0x00007FFA03221000-memory.dmp

      Filesize

      9.6MB

    • memory/4380-31-0x00007FFA02880000-0x00007FFA03221000-memory.dmp

      Filesize

      9.6MB