Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
137s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2024, 01:00
Static task
static1
Behavioral task
behavioral1
Sample
IMGNarudžbenaCom45batan433523572345235235ts.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
IMGNarudžbenaCom45batan433523572345235235ts.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
truxillic.ott
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
truxillic.ott
Resource
win10v2004-20240802-en
General
-
Target
IMGNarudžbenaCom45batan433523572345235235ts.exe
-
Size
900KB
-
MD5
daa5dbd6b9251157b1309f9ad11a5844
-
SHA1
a16a150c84f2835dab24cce05727c4c5ffe6852f
-
SHA256
7ecad71d8959532c157260b37eb56d28ff819b70b16034a467cef6327024a806
-
SHA512
43cdc736ea7babe27765b6bdf32eb13189a392990b7cd2c2a611675a8b217a49deac4f3595cdc7c0460ee7a3eb508a0c51e295b8357030981e4ad4f92b4075ea
-
SSDEEP
12288:7KQqt6ga1nGHXK24N3YrggCgXJ+EP5dDEmsopm3gImdvDjS0yBJg4aHMEf3PscmT:G891GHkgCsJ+EPq3gPdLu/azf3KT
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 1104 powershell.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\ledning.god IMGNarudžbenaCom45batan433523572345235235ts.exe File opened for modification C:\Program Files (x86)\Common Files\sygebesgene.out IMGNarudžbenaCom45batan433523572345235235ts.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2852 1104 WerFault.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IMGNarudžbenaCom45batan433523572345235235ts.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 1104 powershell.exe 1104 powershell.exe 1104 powershell.exe 1104 powershell.exe 1104 powershell.exe 1104 powershell.exe 1104 powershell.exe 1104 powershell.exe 1104 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1104 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3552 wrote to memory of 1104 3552 IMGNarudžbenaCom45batan433523572345235235ts.exe 87 PID 3552 wrote to memory of 1104 3552 IMGNarudžbenaCom45batan433523572345235235ts.exe 87 PID 3552 wrote to memory of 1104 3552 IMGNarudžbenaCom45batan433523572345235235ts.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\IMGNarudžbenaCom45batan433523572345235235ts.exe"C:\Users\Admin\AppData\Local\Temp\IMGNarudžbenaCom45batan433523572345235235ts.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3552 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle hidden "$Quinaldyl=Get-Content 'C:\Users\Admin\AppData\Local\Temp\Louk\percha\Tasterutinen.nat';$Bisamer=$Quinaldyl.SubString(55602,3);.$Bisamer($Quinaldyl)"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1104 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1104 -s 26323⤵
- Program crash
PID:2852
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1104 -ip 11041⤵PID:2832
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
54KB
MD5108c81a0ded88c932a3b2c47e32c25f9
SHA18f30f3d1803831107e03961710b509b5836a68ae
SHA2560c26f123a4dc4bcfb9bc6347ab9d76d941947fe7b2e1857a66d7cd8d8ffb5c17
SHA512900a6ce3e4766f452b9c8cb42a37efed55ccf25b9647c32440b214c0b5610f9115007487fedccbd5305ab7b51d24c9434cd92bd7d294b17c91c459e3b5ad164f
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82