Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
111s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17/08/2024, 18:49
Behavioral task
behavioral1
Sample
fd1c4cbf9d453ae4c1ca38738a340200N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
fd1c4cbf9d453ae4c1ca38738a340200N.exe
Resource
win10v2004-20240802-en
General
-
Target
fd1c4cbf9d453ae4c1ca38738a340200N.exe
-
Size
33KB
-
MD5
fd1c4cbf9d453ae4c1ca38738a340200
-
SHA1
58c60758587a65050b403f1e3556d0255f3060c7
-
SHA256
4a1b16364c0928824aa286ffa2d028965723cbd35c8fc04b36562736c281df47
-
SHA512
9833acc01d95a9246b568a30885a2f595a75a0ce897ec122ee605782e4a111915e0831d7f02ac75cbe599861600da48fe3e2c4ca32d8524f05500771bb946146
-
SSDEEP
768:4noSEjp9Plchfr6TUqnbcuyD7UYK4pavvvZeee26666HEEExTtqqqqBttttv:4oSEZWTUUqnouy8YXEvvvZeee5Lttttv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation fd1c4cbf9d453ae4c1ca38738a340200N.exe -
Executes dropped EXE 1 IoCs
pid Process 812 igkhost.exe -
resource yara_rule behavioral2/memory/3568-0-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral2/files/0x000b000000023449-3.dat upx behavioral2/memory/3568-5-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral2/memory/812-6-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral2/memory/812-12-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral2/memory/812-15-0x0000000000400000-0x000000000040E000-memory.dmp upx -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Debug\igkhost.exe fd1c4cbf9d453ae4c1ca38738a340200N.exe File opened for modification C:\Windows\Debug\igkhost.exe fd1c4cbf9d453ae4c1ca38738a340200N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fd1c4cbf9d453ae4c1ca38738a340200N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igkhost.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 igkhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz igkhost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3568 fd1c4cbf9d453ae4c1ca38738a340200N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3568 wrote to memory of 2088 3568 fd1c4cbf9d453ae4c1ca38738a340200N.exe 88 PID 3568 wrote to memory of 2088 3568 fd1c4cbf9d453ae4c1ca38738a340200N.exe 88 PID 3568 wrote to memory of 2088 3568 fd1c4cbf9d453ae4c1ca38738a340200N.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\fd1c4cbf9d453ae4c1ca38738a340200N.exe"C:\Users\Admin\AppData\Local\Temp\fd1c4cbf9d453ae4c1ca38738a340200N.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\FD1C4C~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:2088
-
-
C:\Windows\Debug\igkhost.exeC:\Windows\Debug\igkhost.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:812
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD5b040b39829000ff996fcc4a34db88b45
SHA14b5ea12151976eae8e66d16c9dade2320f3b274f
SHA2567ac92d7185846f0954cd26d888ee788571f2537ba56164f299475f3d8360738f
SHA5120b1fce892fd26fb59b4fbe8e62f0b6e64cb2f8a868de67252f9c6810b4d3502c228ece099f7798dd420f60e28a30a28bff6457c3b85916de61d6faebbf5b8a57