Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/08/2024, 19:56
Static task
static1
Behavioral task
behavioral1
Sample
f11c7bce06ba3ffcb49c370e81607da0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f11c7bce06ba3ffcb49c370e81607da0N.exe
Resource
win10v2004-20240802-en
General
-
Target
f11c7bce06ba3ffcb49c370e81607da0N.exe
-
Size
538KB
-
MD5
f11c7bce06ba3ffcb49c370e81607da0
-
SHA1
43c21f0230ed183d9da37d68411dff6002bc8907
-
SHA256
86e32debc724ab505081f11fd3fc8088cdf26654411053deb76a4aec3d7e665a
-
SHA512
e59b0ba543ca9fa6b457f578481072745a4571f2cd3f351226ecaa513b6260e189cc5af9811d6f0c7373e3c9902b3ef632d8b6c9cae18663932697f4ec20f453
-
SSDEEP
12288:/n8yN0Mr8ZJJw1jm0Uq+pnWHDiZPWho5hWcrIm+xM/EWGKWYuaP:vPuZJK1Kbgq+h2rdjWYb
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation f11c7bce06ba3ffcb49c370e81607da0N.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation Isass.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation f11c7bce06ba3ffcb49c370e81607da0N.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation Isass.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation f11c7bce06ba3ffcb49c370e81607da0N.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation Isass.exe -
Executes dropped EXE 5 IoCs
pid Process 708 Isass.exe 5080 Isass.exe 244 Isass.exe 2224 Isass.exe 3228 f11c7bce06ba3ffcb49c370e81607da0N.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Isass.exe = "C:\\Users\\Public\\Microsoft Build\\Isass.exe" f11c7bce06ba3ffcb49c370e81607da0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Isass.exe = "C:\\Users\\Public\\Microsoft Build\\Isass.exe" f11c7bce06ba3ffcb49c370e81607da0N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f11c7bce06ba3ffcb49c370e81607da0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f11c7bce06ba3ffcb49c370e81607da0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Isass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Isass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f11c7bce06ba3ffcb49c370e81607da0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Isass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f11c7bce06ba3ffcb49c370e81607da0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Isass.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 4428 f11c7bce06ba3ffcb49c370e81607da0N.exe 4428 f11c7bce06ba3ffcb49c370e81607da0N.exe 708 Isass.exe 708 Isass.exe 5080 Isass.exe 5080 Isass.exe 5080 Isass.exe 5080 Isass.exe 5080 Isass.exe 5080 Isass.exe 2212 f11c7bce06ba3ffcb49c370e81607da0N.exe 2212 f11c7bce06ba3ffcb49c370e81607da0N.exe 244 Isass.exe 244 Isass.exe 244 Isass.exe 244 Isass.exe 244 Isass.exe 244 Isass.exe 1368 f11c7bce06ba3ffcb49c370e81607da0N.exe 1368 f11c7bce06ba3ffcb49c370e81607da0N.exe 2224 Isass.exe 2224 Isass.exe 2224 Isass.exe 2224 Isass.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4428 wrote to memory of 708 4428 f11c7bce06ba3ffcb49c370e81607da0N.exe 84 PID 4428 wrote to memory of 708 4428 f11c7bce06ba3ffcb49c370e81607da0N.exe 84 PID 4428 wrote to memory of 708 4428 f11c7bce06ba3ffcb49c370e81607da0N.exe 84 PID 4428 wrote to memory of 5080 4428 f11c7bce06ba3ffcb49c370e81607da0N.exe 85 PID 4428 wrote to memory of 5080 4428 f11c7bce06ba3ffcb49c370e81607da0N.exe 85 PID 4428 wrote to memory of 5080 4428 f11c7bce06ba3ffcb49c370e81607da0N.exe 85 PID 5080 wrote to memory of 2212 5080 Isass.exe 87 PID 5080 wrote to memory of 2212 5080 Isass.exe 87 PID 5080 wrote to memory of 2212 5080 Isass.exe 87 PID 2212 wrote to memory of 244 2212 f11c7bce06ba3ffcb49c370e81607da0N.exe 88 PID 2212 wrote to memory of 244 2212 f11c7bce06ba3ffcb49c370e81607da0N.exe 88 PID 2212 wrote to memory of 244 2212 f11c7bce06ba3ffcb49c370e81607da0N.exe 88 PID 244 wrote to memory of 1368 244 Isass.exe 89 PID 244 wrote to memory of 1368 244 Isass.exe 89 PID 244 wrote to memory of 1368 244 Isass.exe 89 PID 1368 wrote to memory of 2224 1368 f11c7bce06ba3ffcb49c370e81607da0N.exe 90 PID 1368 wrote to memory of 2224 1368 f11c7bce06ba3ffcb49c370e81607da0N.exe 90 PID 1368 wrote to memory of 2224 1368 f11c7bce06ba3ffcb49c370e81607da0N.exe 90 PID 2224 wrote to memory of 3228 2224 Isass.exe 92 PID 2224 wrote to memory of 3228 2224 Isass.exe 92 PID 2224 wrote to memory of 3228 2224 Isass.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\f11c7bce06ba3ffcb49c370e81607da0N.exe"C:\Users\Admin\AppData\Local\Temp\f11c7bce06ba3ffcb49c370e81607da0N.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:708
-
-
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\f11c7bce06ba3ffcb49c370e81607da0N.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Users\Admin\AppData\Local\Temp\f11c7bce06ba3ffcb49c370e81607da0N.exe"C:\Users\Admin\AppData\Local\Temp\f11c7bce06ba3ffcb49c370e81607da0N.exe"3⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\f11c7bce06ba3ffcb49c370e81607da0N.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:244 -
C:\Users\Admin\AppData\Local\Temp\f11c7bce06ba3ffcb49c370e81607da0N.exe"C:\Users\Admin\AppData\Local\Temp\f11c7bce06ba3ffcb49c370e81607da0N.exe"5⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\f11c7bce06ba3ffcb49c370e81607da0N.exe6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\f11c7bce06ba3ffcb49c370e81607da0N.exe"C:\Users\Admin\AppData\Local\Temp\f11c7bce06ba3ffcb49c370e81607da0N.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3228
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
679KB
MD5abe14d1bf5f0ebc716a7aade4efe24e9
SHA1b930a32e3b0ef87e73dcf8f21457c2d201ad3100
SHA2566f9e3b08ed77d07ccec21ff45b4cbc66a2bf6e41a2dbf5ba6d98486d0be6764e
SHA512ae0e612e7349de7c818902f4811f7e5258a5d7dd8f324fe1209d6b18b829090d0e179fa3161fbcfe16a740e9919f51a7aaf712bf698d57af8fdbb136097383ec
-
Filesize
284KB
MD5a42b35f975d88c1370a7aff084ee57a7
SHA1bee1408fe0b15f6f719f003e46aee5ec424cf608
SHA25656cc9e7e3767c0cffae8161bf0ad13457487c1b422e2879b897dbd4bab115776
SHA512b92d05515e18277db660118934e70678ee2a3bb66005bad19bb417ffaedb22a63727a5a697ca3ac0f6c48f6f5593ba45ab80f4ebdc0eaed10d80b7af04d45b23
-
Filesize
216KB
MD50609171772ed1682bd6adb41673f32b2
SHA175456deb7fe05cc2a5806623b6b216bc4fc47243
SHA256de84bb36c0b33b5ddc3f6d54c8b087649b51e8cf8a80bace4fd92258d46443e3
SHA512693c912a8253c62a446f072035f9775dfce0c45b0160710ee4bf8a0c296af0f9fcda24b22bc24050d837338b22371bc6eecd6f3e8ed7e0bde8b13b56e83ce778