Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/08/2024, 09:56
Static task
static1
Behavioral task
behavioral1
Sample
Infatica P2B/infatica_agent.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Infatica P2B/infatica_agent.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Infatica P2B/unins000.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
Infatica P2B/unins000.exe
Resource
win10v2004-20240802-en
General
-
Target
Infatica P2B/unins000.exe
-
Size
1.1MB
-
MD5
0c083266eec7437ba0dfe44e451ab71f
-
SHA1
4754cda6c84cea49c6a1f0d79b2c42958de2c7e9
-
SHA256
d2dcf7ed0c656532ed25cd496ac237223985bb56cb688f125cbbf940ddb9c6bb
-
SHA512
08c7140b707f78d1203f5cf21bf55dab32a63f71cf8c530af4afcfaf5a42f9431a09794708d57102d065955b1e296dab979855579e445bfdfbf649f75ce3ce22
-
SSDEEP
24576:JtdAm9DUi/CR3wCkCiRgoG7hBaHkbEXXeG/jFt5lTxytj:3qTytRFk6ek1Lo
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation _iu14D2N.tmp -
Deletes itself 1 IoCs
pid Process 1572 _iu14D2N.tmp -
Executes dropped EXE 1 IoCs
pid Process 1572 _iu14D2N.tmp -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ipinfo.io -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unins000.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _iu14D2N.tmp -
Kills process with taskkill 1 IoCs
pid Process 3820 taskkill.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 5 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3820 taskkill.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1572 _iu14D2N.tmp -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4008 wrote to memory of 1572 4008 unins000.exe 84 PID 4008 wrote to memory of 1572 4008 unins000.exe 84 PID 4008 wrote to memory of 1572 4008 unins000.exe 84 PID 1572 wrote to memory of 3820 1572 _iu14D2N.tmp 92 PID 1572 wrote to memory of 3820 1572 _iu14D2N.tmp 92 PID 1572 wrote to memory of 3820 1572 _iu14D2N.tmp 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\Infatica P2B\unins000.exe"C:\Users\Admin\AppData\Local\Temp\Infatica P2B\unins000.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Users\Admin\AppData\Local\Temp\_iu14D2N.tmp"C:\Users\Admin\AppData\Local\Temp\_iu14D2N.tmp" /SECONDPHASE="C:\Users\Admin\AppData\Local\Temp\Infatica P2B\unins000.exe" /FIRSTPHASEWND=$602822⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /T /F /IM infatica_agent.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3820
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD50c083266eec7437ba0dfe44e451ab71f
SHA14754cda6c84cea49c6a1f0d79b2c42958de2c7e9
SHA256d2dcf7ed0c656532ed25cd496ac237223985bb56cb688f125cbbf940ddb9c6bb
SHA51208c7140b707f78d1203f5cf21bf55dab32a63f71cf8c530af4afcfaf5a42f9431a09794708d57102d065955b1e296dab979855579e445bfdfbf649f75ce3ce22