Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    110s
  • max time network
    105s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/08/2024, 06:42

General

  • Target

    98a842f4cb63a098799a32253254a3e0N.exe

  • Size

    1.1MB

  • MD5

    98a842f4cb63a098799a32253254a3e0

  • SHA1

    db45e72c0cacfe3cac4e139d0cbdad3e4199dcac

  • SHA256

    30c29a9ddc1ead0932ebf8b374d605a9dad97250968e51011605583e51d8f0a6

  • SHA512

    692bec311120f04ec20ff5ce41a54b0731eea45b0a93e7b26dca7d305be283af4c6364582b83bf50fac8b3c54be804432063f629b5b6818b4648a1c5a85dc638

  • SSDEEP

    24576:Z9ndEVf7TpiaGlN5WUG16CU3nM9SVYPxrkI5:Z9dcjTpia25W/7UXM9SVemI5

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\98a842f4cb63a098799a32253254a3e0N.exe
    "C:\Users\Admin\AppData\Local\Temp\98a842f4cb63a098799a32253254a3e0N.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4432
    • C:\Program Files (x86)\Microsoft Build\Isass.exe
      "C:\Program Files (x86)\Microsoft Build\Isass.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:1868
    • C:\Users\Admin\AppData\Local\Temp\IG_98a842f4cb63a098799a32253254a3e0N.exe
      "C:\Users\Admin\AppData\Local\Temp\IG_98a842f4cb63a098799a32253254a3e0N.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:5080
      • C:\Windows\Temp\{44F64476-9525-409B-BA9F-9FF99E203970}\.cr\IG_98a842f4cb63a098799a32253254a3e0N.exe
        "C:\Windows\Temp\{44F64476-9525-409B-BA9F-9FF99E203970}\.cr\IG_98a842f4cb63a098799a32253254a3e0N.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\IG_98a842f4cb63a098799a32253254a3e0N.exe" -burn.filehandle.attached=552 -burn.filehandle.self=696
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:4376

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Microsoft Build\Isass.exe

    Filesize

    213KB

    MD5

    deb205aab1f21cfbdb4929194ad7e5ac

    SHA1

    b86cd30bf8125918ba61902787fbb4583ad1ea4f

    SHA256

    c8ae8da7e558e44ea789d15fb47c1a606e8763e72d477f437648d627c5eb5e67

    SHA512

    52e76f568cc4397ae8e669bfe1bd86ce03e456092aef9a09077296e33042af16ac8c3ccd8d4c2efd2e7524c5dc18bd91d1c182b2dd7b7a6834fdbe388b2dd899

  • C:\ProgramData\Microsoft\ClickToRun\{9AC08E99-230B-47e8-9721-4577B7F124EA}\integrator.exe

    Filesize

    6.8MB

    MD5

    966075180eb821b9d6c615aeb45110b5

    SHA1

    00bde58ec9f223f59f12e5258beca98861437ede

    SHA256

    64e8e8e9ddd3f8209397ba8d23ce4141c44e2ec203cf9db87b8add719847d1ee

    SHA512

    5ea43783cea64a1945bf39a503d3fa61d2b21f6ff8819185ccdcbac54a0db86a04ab50529e6aab964e0d2c50c0e67faa6dc986d5251858e079f1a39460833f6e

  • C:\Users\Admin\AppData\Local\Temp\IG_98a842f4cb63a098799a32253254a3e0N.exe

    Filesize

    855KB

    MD5

    7711c60d5db60b1dfd6660016cf02d6f

    SHA1

    6b38524ee7961e9bd224c75ead54449c0d77bb12

    SHA256

    f13fda5a87d010e15eb167e5dcaec27121e4427ae9c8c9991db95ed5fe36de1b

    SHA512

    55aac69297dd5a19d8a78e0e36ce6be23d940d26ac4831e1db09c9aa5b43243158b8f2b24df4a2638b98442c305b0bd1547d8c597c8339e5938e73417820ac37

  • C:\Windows\Temp\{A089F797-D349-487C-BB62-AB42D0F8E0EF}\.ba\PythonBA.dll

    Filesize

    671KB

    MD5

    5d8fa952950469a8904e4f68ac193699

    SHA1

    ce9f68fb9601b9a5b95fc93c88a3a22ed42afa3d

    SHA256

    ca7527124a97079c229332867bd27fede3eb263a52639b4bdaf39ed47e604e57

    SHA512

    58c43a813ff9f5bebe2928e68b7f28f999922248ccc6e8cf6ce5f14baf6aa42b9b8e59fe9b638c5376e7e4e86fe21eae185fd51328b7b000bbe6903794e161b4

  • C:\Windows\Temp\{A089F797-D349-487C-BB62-AB42D0F8E0EF}\.ba\SideBar.png

    Filesize

    50KB

    MD5

    888eb713a0095756252058c9727e088a

    SHA1

    c14f69f2bef6bc3e2162b4dd78e9df702d94cdb4

    SHA256

    79434bd1368f47f08acf6db66638531d386bf15166d78d9bfea4da164c079067

    SHA512

    7c59f4ada242b19c2299b6789a65a1f34565fed78730c22c904db16a9872fe6a07035c6d46a64ee94501fbcd96de586a8a5303ca22f33da357d455c014820ca0

  • memory/1868-77-0x0000000000400000-0x00000000016A7000-memory.dmp

    Filesize

    18.7MB

  • memory/1868-92-0x0000000000400000-0x00000000016A7000-memory.dmp

    Filesize

    18.7MB

  • memory/1868-108-0x0000000000400000-0x00000000016A7000-memory.dmp

    Filesize

    18.7MB

  • memory/1868-8-0x0000000003520000-0x0000000003521000-memory.dmp

    Filesize

    4KB

  • memory/1868-76-0x0000000000400000-0x00000000016A7000-memory.dmp

    Filesize

    18.7MB

  • memory/1868-6-0x0000000000400000-0x00000000016A7000-memory.dmp

    Filesize

    18.7MB

  • memory/1868-78-0x0000000000400000-0x00000000016A7000-memory.dmp

    Filesize

    18.7MB

  • memory/1868-100-0x0000000000400000-0x00000000016A7000-memory.dmp

    Filesize

    18.7MB

  • memory/1868-87-0x0000000000400000-0x00000000016A7000-memory.dmp

    Filesize

    18.7MB

  • memory/1868-99-0x0000000000400000-0x00000000016A7000-memory.dmp

    Filesize

    18.7MB

  • memory/1868-95-0x0000000000400000-0x00000000016A7000-memory.dmp

    Filesize

    18.7MB

  • memory/1868-96-0x0000000000400000-0x00000000016A7000-memory.dmp

    Filesize

    18.7MB

  • memory/1868-97-0x0000000000400000-0x00000000016A7000-memory.dmp

    Filesize

    18.7MB

  • memory/1868-98-0x0000000000400000-0x00000000016A7000-memory.dmp

    Filesize

    18.7MB

  • memory/4432-21-0x0000000000400000-0x00000000016A7000-memory.dmp

    Filesize

    18.7MB

  • memory/4432-4-0x0000000000400000-0x00000000016A7000-memory.dmp

    Filesize

    18.7MB

  • memory/4432-7-0x0000000001960000-0x0000000001961000-memory.dmp

    Filesize

    4KB