Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2024, 21:44
Static task
static1
Behavioral task
behavioral1
Sample
1eed8983752d58c4b1935127dec616c0N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
1eed8983752d58c4b1935127dec616c0N.exe
Resource
win10v2004-20240802-en
General
-
Target
1eed8983752d58c4b1935127dec616c0N.exe
-
Size
47KB
-
MD5
1eed8983752d58c4b1935127dec616c0
-
SHA1
b58d2d6aa08dc7a954b6f4e491d07aab4f0cb8ef
-
SHA256
903e4088c4a275c256513058232c62b6385d07d37c5d97ecbeb8163c205897bb
-
SHA512
e5373d0af11ecf4a3c7daa5109c4ccdc0df463e6431e521f0faa151abb8abfef2638bea7ecdf3d15c0eafab7cde03fc4cb3803e757e4a4522550a33acb980982
-
SSDEEP
768:xWRR4LiBiapyJJ+2ZXUFGtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZsBGWlk4G:x0aiBzpzOXvtdgI2MyzNORQtOflIwoHH
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation 1eed8983752d58c4b1935127dec616c0N.exe -
Executes dropped EXE 1 IoCs
pid Process 2376 suip.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1eed8983752d58c4b1935127dec616c0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language suip.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3920 wrote to memory of 2376 3920 1eed8983752d58c4b1935127dec616c0N.exe 93 PID 3920 wrote to memory of 2376 3920 1eed8983752d58c4b1935127dec616c0N.exe 93 PID 3920 wrote to memory of 2376 3920 1eed8983752d58c4b1935127dec616c0N.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\1eed8983752d58c4b1935127dec616c0N.exe"C:\Users\Admin\AppData\Local\Temp\1eed8983752d58c4b1935127dec616c0N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Users\Admin\AppData\Local\Temp\suip.exe"C:\Users\Admin\AppData\Local\Temp\suip.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3840,i,8231329449558834090,4540802069600791165,262144 --variations-seed-version --mojo-platform-channel-handle=1308 /prefetch:81⤵PID:2408
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
47KB
MD545426506cb4ad721b9e117b65b624351
SHA115cd7a9802923f9d49878ea5e7eccd3035badc7d
SHA25650082433a5462e27eb95714f296e2acf1a377961e406cda5f0b2a33ddfe509cb
SHA512ff062980851bb05f2157b08f89d9157b69f8c4ef758ffa763fb337afb8cbc88939901c096ce2d6b8a62b9262ff929cd9d5a9bcb6fa59bf128f2bed8b6bdd1b05