Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/08/2024, 22:57
Static task
static1
Behavioral task
behavioral1
Sample
PID Key Checker/AutomaticUpdater.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
PID Key Checker/AutomaticUpdater.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
PID Key Checker/PID Key Checker.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
PID Key Checker/PID Key Checker.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
PID Key Checker/pidgenx.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral6
Sample
PID Key Checker/wyUpdate.exe
Resource
win7-20240705-en
Behavioral task
behavioral7
Sample
PID Key Checker/wyUpdate.exe
Resource
win10v2004-20240802-en
General
-
Target
PID Key Checker/PID Key Checker.exe
-
Size
9.7MB
-
MD5
cfae82ef8329044b196c682444c2060e
-
SHA1
e7bdd49030e7a6b8efef1a4201e95f2a385a06f6
-
SHA256
22fc1ce3806264ff01abc40e818a70bc467027b9dea29422a362d15e48e108bd
-
SHA512
783ae2588d9a557be59eabe4107e0fdd7c97f3173f3e11bb4ade53c19e16d8497a71599492408849a5eeb7a56278f3d50a3417971c8d1b388fc550731aa30037
-
SSDEEP
98304:z2xA9DMbJcioxcKK2SewFiYCJc7vfmIAh19DMbJcioxcKK2SewFiYCJc7vfmIqNn:ytAAqMsiD6Gu
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation PID Key Checker.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 35 raw.githubusercontent.com 36 raw.githubusercontent.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PID Key Checker.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2156 PID Key Checker.exe Token: SeDebugPrivilege 4844 wyUpdate.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2156 wrote to memory of 4844 2156 PID Key Checker.exe 90 PID 2156 wrote to memory of 4844 2156 PID Key Checker.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\PID Key Checker\PID Key Checker.exe"C:\Users\Admin\AppData\Local\Temp\PID Key Checker\PID Key Checker.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\PID Key Checker\wyUpdate.exe"C:\Users\Admin\AppData\Local\Temp\PID Key Checker\wyUpdate.exe" /autoupdate2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4844
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\5457A8CE4B2A7499F8299A013B6E1C7C_D734EC3DD00546F46D368325396086B0
Filesize5B
MD55bfa51f3a417b98e7443eca90fc94703
SHA18c015d80b8a23f780bdd215dc842b0f5551f63bd
SHA256bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128
SHA5124cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399