Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/08/2024, 03:38
Static task
static1
Behavioral task
behavioral1
Sample
d924e01f7741333e94b429512ae8eb47946e4e03cb035aedf6f5b06c4328caec.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
d924e01f7741333e94b429512ae8eb47946e4e03cb035aedf6f5b06c4328caec.exe
Resource
win10v2004-20240802-en
General
-
Target
d924e01f7741333e94b429512ae8eb47946e4e03cb035aedf6f5b06c4328caec.exe
-
Size
9KB
-
MD5
ab05f29e8de8e59c34860640bc65b74e
-
SHA1
708b1425284a7f4b433287082610dfebc356f395
-
SHA256
d924e01f7741333e94b429512ae8eb47946e4e03cb035aedf6f5b06c4328caec
-
SHA512
96e3f5ff355a7246d9e34a30e052cc79a204ab859f7c76a9a897da6b2d5cffd12f9fa6be7b6e5c64e37e1043d4aa32c089892ad7aa5a208a843565c496119ce0
-
SSDEEP
96:mBLYtOvLGaDlZ6wAnQWRRUlCXmfVwSbwT/3fyQSqpVRdw3zwBrA:mBLYt6lZmQWRRVXm9w7fbvrG
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation d924e01f7741333e94b429512ae8eb47946e4e03cb035aedf6f5b06c4328caec.exe -
Executes dropped EXE 1 IoCs
pid Process 3592 denis.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d924e01f7741333e94b429512ae8eb47946e4e03cb035aedf6f5b06c4328caec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language denis.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 680 wrote to memory of 3592 680 d924e01f7741333e94b429512ae8eb47946e4e03cb035aedf6f5b06c4328caec.exe 85 PID 680 wrote to memory of 3592 680 d924e01f7741333e94b429512ae8eb47946e4e03cb035aedf6f5b06c4328caec.exe 85 PID 680 wrote to memory of 3592 680 d924e01f7741333e94b429512ae8eb47946e4e03cb035aedf6f5b06c4328caec.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\d924e01f7741333e94b429512ae8eb47946e4e03cb035aedf6f5b06c4328caec.exe"C:\Users\Admin\AppData\Local\Temp\d924e01f7741333e94b429512ae8eb47946e4e03cb035aedf6f5b06c4328caec.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:680 -
C:\Users\Admin\AppData\Local\Temp\denis.exe"C:\Users\Admin\AppData\Local\Temp\denis.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3592
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD5036081f45f2cc9dab83b87a3974d3296
SHA119b88e4d2bf8d83bab0efb6a656115be7433765b
SHA25648263a23d395706c0258136a6637eb80344da86b6bcabbe95451b1cafe9ea865
SHA5128aeaddf879207a2cd5e4b087a7640bb05a040c4c433a45dece0cf389460c8af3b74df9c7a2bc50e97444a38084b8b66e3cb19b7b6ffdc5ea53e5eb2e13469d02