Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/08/2024, 06:36
Behavioral task
behavioral1
Sample
7cf6112e482c5f3df51ce751160353d0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
7cf6112e482c5f3df51ce751160353d0N.exe
Resource
win10v2004-20240802-en
General
-
Target
7cf6112e482c5f3df51ce751160353d0N.exe
-
Size
134KB
-
MD5
7cf6112e482c5f3df51ce751160353d0
-
SHA1
13952b0a85856fbe0d8ba49887a9125569a54490
-
SHA256
3e70f4bcda45dd4fd17d29afb9dfe32043e2621ac0efb017bf111f0dcc3373d4
-
SHA512
522802d4d04448d2c8ad5e0d718edbb72f54db10e927b4df76db40f1b66b877e5ac19923778a37802b23fcd7965625f14bf84d5053bf3d6225d8fafc2f5e55e7
-
SSDEEP
1536:rF0AJELopHG9aa+9qX3apJzAKWYr0v7ioy6paK2AZqMIK7aGZh38QE:riAyLN9aa+9U2rW1ip6pr2At7NZuQE
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3760 WwanSvc.exe -
resource yara_rule behavioral2/memory/2620-0-0x0000000000D30000-0x0000000000D58000-memory.dmp upx behavioral2/files/0x00080000000234bc-3.dat upx behavioral2/memory/2620-4-0x0000000000D30000-0x0000000000D58000-memory.dmp upx behavioral2/memory/3760-6-0x0000000000E60000-0x0000000000E88000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Window Update = "\"C:\\ProgramData\\Update\\WwanSvc.exe\" /run" 7cf6112e482c5f3df51ce751160353d0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7cf6112e482c5f3df51ce751160353d0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WwanSvc.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2620 wrote to memory of 3760 2620 7cf6112e482c5f3df51ce751160353d0N.exe 83 PID 2620 wrote to memory of 3760 2620 7cf6112e482c5f3df51ce751160353d0N.exe 83 PID 2620 wrote to memory of 3760 2620 7cf6112e482c5f3df51ce751160353d0N.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\7cf6112e482c5f3df51ce751160353d0N.exe"C:\Users\Admin\AppData\Local\Temp\7cf6112e482c5f3df51ce751160353d0N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\ProgramData\Update\WwanSvc.exe"C:\ProgramData\Update\WwanSvc.exe" /run2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3760
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD55bd108ba5944551ccfb7665ddacd094c
SHA166bc37271a64f37fb4781c3af752706fd6d90ef4
SHA256e408ca36e9bf1601b4bad19edea09c6df30fca70701dc21b873f8d03905ec142
SHA512b0d64aafc46da7ce0f3e905091a2856a8d1ad790bbeb55eb1d0b9ba79ae5ce12b181ab2df6b9da8ddc36cc255f669f1d76c77331ec2bf3a227c76b8a76b0769b