Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2024, 10:12
Static task
static1
Behavioral task
behavioral1
Sample
81f069c4d7744588c4df0519a1b1e84dfd58a68232753726c103266a037ed6d4.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
81f069c4d7744588c4df0519a1b1e84dfd58a68232753726c103266a037ed6d4.exe
Resource
win10v2004-20240802-en
General
-
Target
81f069c4d7744588c4df0519a1b1e84dfd58a68232753726c103266a037ed6d4.exe
-
Size
727KB
-
MD5
53d2bc3100160eded9a20ef1076687ed
-
SHA1
1c2d8bd19c921872e27662f36436bfec68712b8a
-
SHA256
81f069c4d7744588c4df0519a1b1e84dfd58a68232753726c103266a037ed6d4
-
SHA512
bc5e6cf2d3b3d3c8373b9ea0ba593ea4b94d5faadb6e04c0b05e3c346fc22ee3d10fcc92008c55c8f493864fcf89205aeb5265d166f1e488a927a87ad6d14417
-
SSDEEP
12288:I//o5HC8btqqqKmP0E8HVNqLhYh+mtKqDmPEsTHNxfw:8kqTKy8HAwVasQw
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2396 RuntimeBroker.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 81f069c4d7744588c4df0519a1b1e84dfd58a68232753726c103266a037ed6d4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RuntimeBroker.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 64 timeout.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 4228 81f069c4d7744588c4df0519a1b1e84dfd58a68232753726c103266a037ed6d4.exe 4228 81f069c4d7744588c4df0519a1b1e84dfd58a68232753726c103266a037ed6d4.exe 4228 81f069c4d7744588c4df0519a1b1e84dfd58a68232753726c103266a037ed6d4.exe 4228 81f069c4d7744588c4df0519a1b1e84dfd58a68232753726c103266a037ed6d4.exe 4228 81f069c4d7744588c4df0519a1b1e84dfd58a68232753726c103266a037ed6d4.exe 4228 81f069c4d7744588c4df0519a1b1e84dfd58a68232753726c103266a037ed6d4.exe 4228 81f069c4d7744588c4df0519a1b1e84dfd58a68232753726c103266a037ed6d4.exe 4228 81f069c4d7744588c4df0519a1b1e84dfd58a68232753726c103266a037ed6d4.exe 4228 81f069c4d7744588c4df0519a1b1e84dfd58a68232753726c103266a037ed6d4.exe 4228 81f069c4d7744588c4df0519a1b1e84dfd58a68232753726c103266a037ed6d4.exe 4228 81f069c4d7744588c4df0519a1b1e84dfd58a68232753726c103266a037ed6d4.exe 4228 81f069c4d7744588c4df0519a1b1e84dfd58a68232753726c103266a037ed6d4.exe 4228 81f069c4d7744588c4df0519a1b1e84dfd58a68232753726c103266a037ed6d4.exe 4228 81f069c4d7744588c4df0519a1b1e84dfd58a68232753726c103266a037ed6d4.exe 4228 81f069c4d7744588c4df0519a1b1e84dfd58a68232753726c103266a037ed6d4.exe 4228 81f069c4d7744588c4df0519a1b1e84dfd58a68232753726c103266a037ed6d4.exe 4228 81f069c4d7744588c4df0519a1b1e84dfd58a68232753726c103266a037ed6d4.exe 4228 81f069c4d7744588c4df0519a1b1e84dfd58a68232753726c103266a037ed6d4.exe 4228 81f069c4d7744588c4df0519a1b1e84dfd58a68232753726c103266a037ed6d4.exe 4228 81f069c4d7744588c4df0519a1b1e84dfd58a68232753726c103266a037ed6d4.exe 4228 81f069c4d7744588c4df0519a1b1e84dfd58a68232753726c103266a037ed6d4.exe 4228 81f069c4d7744588c4df0519a1b1e84dfd58a68232753726c103266a037ed6d4.exe 4228 81f069c4d7744588c4df0519a1b1e84dfd58a68232753726c103266a037ed6d4.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4228 81f069c4d7744588c4df0519a1b1e84dfd58a68232753726c103266a037ed6d4.exe Token: SeDebugPrivilege 2396 RuntimeBroker.exe Token: SeDebugPrivilege 2396 RuntimeBroker.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4228 wrote to memory of 3680 4228 81f069c4d7744588c4df0519a1b1e84dfd58a68232753726c103266a037ed6d4.exe 91 PID 4228 wrote to memory of 3680 4228 81f069c4d7744588c4df0519a1b1e84dfd58a68232753726c103266a037ed6d4.exe 91 PID 4228 wrote to memory of 3680 4228 81f069c4d7744588c4df0519a1b1e84dfd58a68232753726c103266a037ed6d4.exe 91 PID 3680 wrote to memory of 64 3680 cmd.exe 93 PID 3680 wrote to memory of 64 3680 cmd.exe 93 PID 3680 wrote to memory of 64 3680 cmd.exe 93 PID 3680 wrote to memory of 2396 3680 cmd.exe 95 PID 3680 wrote to memory of 2396 3680 cmd.exe 95 PID 3680 wrote to memory of 2396 3680 cmd.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\81f069c4d7744588c4df0519a1b1e84dfd58a68232753726c103266a037ed6d4.exe"C:\Users\Admin\AppData\Local\Temp\81f069c4d7744588c4df0519a1b1e84dfd58a68232753726c103266a037ed6d4.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp9E92.tmp.bat""2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:64
-
-
C:\Users\Public\RuntimeBroker.exe"C:\Users\Public\RuntimeBroker.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2396
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
142B
MD5f675ef70d6f74fa4fdcc65d640c0db11
SHA14151c18d6da21017d8c56a8dd34c2afc63c6592d
SHA256d2cf80ae78ccb7e257e9fc98bb51efa51a52c4e0a7a33c7b39daf5719e05ed31
SHA5120eb59c2415460124ae36780eb7626d8e27da35d9daed7f3f7a514f04fdef4c72aea95b30f7e897efdc3ef9fe39a4c72d68515be6fca298164c196884d979653d
-
Filesize
727KB
MD553d2bc3100160eded9a20ef1076687ed
SHA11c2d8bd19c921872e27662f36436bfec68712b8a
SHA25681f069c4d7744588c4df0519a1b1e84dfd58a68232753726c103266a037ed6d4
SHA512bc5e6cf2d3b3d3c8373b9ea0ba593ea4b94d5faadb6e04c0b05e3c346fc22ee3d10fcc92008c55c8f493864fcf89205aeb5265d166f1e488a927a87ad6d14417