Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/08/2024, 06:34
Behavioral task
behavioral1
Sample
6fd5a5b276ec833984d10066aa543240N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
6fd5a5b276ec833984d10066aa543240N.exe
Resource
win10v2004-20240802-en
General
-
Target
6fd5a5b276ec833984d10066aa543240N.exe
-
Size
59KB
-
MD5
6fd5a5b276ec833984d10066aa543240
-
SHA1
a0576235c4d44a78e6d5f056e05fa2c0c6d9ce5d
-
SHA256
2b608671bb4dd3371486f11cd82867ab1807022c85b45e9f2d244bb9b6b724dd
-
SHA512
5e498641275153cf7afb34ff8671c12107a311785e5a74d71f65d1444b9732bc4f9c8d34d8698e7aec452355bd607099eae4de15230ee4f85c9da05e308b87f2
-
SSDEEP
1536:3+ZgwRdiE8cO4p1xRjfTvSq5r3ZiIZ4nouy8uh1aQQ:OeodiUO4p13b9HiIeoutuh1aQQ
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation 6fd5a5b276ec833984d10066aa543240N.exe -
Executes dropped EXE 1 IoCs
pid Process 4928 AhnSvc.exe -
resource yara_rule behavioral2/memory/3936-0-0x0000000000CC0000-0x0000000000CE7000-memory.dmp upx behavioral2/files/0x000900000002341b-3.dat upx behavioral2/memory/4928-4-0x00000000003D0000-0x00000000003F7000-memory.dmp upx behavioral2/memory/3936-8-0x0000000000CC0000-0x0000000000CE7000-memory.dmp upx behavioral2/memory/4928-9-0x00000000003D0000-0x00000000003F7000-memory.dmp upx behavioral2/memory/4928-10-0x00000000003D0000-0x00000000003F7000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\AhnUpadate = "\"C:\\ProgramData\\AhnLab\\AhnSvc.exe\" /run" 6fd5a5b276ec833984d10066aa543240N.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6fd5a5b276ec833984d10066aa543240N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AhnSvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3936 6fd5a5b276ec833984d10066aa543240N.exe Token: SeDebugPrivilege 4928 AhnSvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3936 wrote to memory of 4928 3936 6fd5a5b276ec833984d10066aa543240N.exe 83 PID 3936 wrote to memory of 4928 3936 6fd5a5b276ec833984d10066aa543240N.exe 83 PID 3936 wrote to memory of 4928 3936 6fd5a5b276ec833984d10066aa543240N.exe 83 PID 3936 wrote to memory of 776 3936 6fd5a5b276ec833984d10066aa543240N.exe 86 PID 3936 wrote to memory of 776 3936 6fd5a5b276ec833984d10066aa543240N.exe 86 PID 3936 wrote to memory of 776 3936 6fd5a5b276ec833984d10066aa543240N.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\6fd5a5b276ec833984d10066aa543240N.exe"C:\Users\Admin\AppData\Local\Temp\6fd5a5b276ec833984d10066aa543240N.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\ProgramData\AhnLab\AhnSvc.exe"C:\ProgramData\AhnLab\AhnSvc.exe" /run2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4928
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del /q "C:\Users\Admin\AppData\Local\Temp\6fd5a5b276ec833984d10066aa543240N.exe" >> NUL2⤵
- System Location Discovery: System Language Discovery
PID:776
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
59KB
MD5d116ba929ab6e59a7d655fa4ae5170ac
SHA1db439e83807a75838f6b8373a564c560ce69c792
SHA2565dd7b312fea6c14d81ad77da4c53debd55788af0fbb67615cc16b8a574a83698
SHA5120593ede2b0c948bb1ef75d9b51f9e7c80da99c8a65f24b073917500f6e9bcd81a9775866a050f12b89b7b5b96d3036d75122ec8c02a40ea1e579cdd9c5caec75