Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/08/2024, 02:53

General

  • Target

    f3cfbadd4b07a92e7116e199dd9f6dd03adf85f3cc38290cccd5880db9cd0131.exe

  • Size

    8.0MB

  • MD5

    0cc09792c4e0ac345a21cb89238251ff

  • SHA1

    76bbadad2c768d56288745f2baf32345f49dc630

  • SHA256

    f3cfbadd4b07a92e7116e199dd9f6dd03adf85f3cc38290cccd5880db9cd0131

  • SHA512

    cdb3bdabb10be88655eee9ec51f97db513adb6f7f48da6cb9d48182f07dd31585db138190ba12560118e871edbad0e0da1d7317118993e8175b140ce6018c93b

  • SSDEEP

    196608:zrpWV8lOtCU3sOAWQnTrpUC5ON+pkb/56AhDk5q:vCmOkuBETrSl0SK5q

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f3cfbadd4b07a92e7116e199dd9f6dd03adf85f3cc38290cccd5880db9cd0131.exe
    "C:\Users\Admin\AppData\Local\Temp\f3cfbadd4b07a92e7116e199dd9f6dd03adf85f3cc38290cccd5880db9cd0131.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4424
    • C:\Users\Admin\AppData\Local\Temp\ntoskrnl.exe
      "C:\Users\Admin\AppData\Local\Temp\ntoskrnl.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4820

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\ntoskrnl.exe

    Filesize

    8.0MB

    MD5

    e7a54485b45276ef0c0be9df3abed3e2

    SHA1

    92bae0c77797a4073714751c727a0a7555df1e04

    SHA256

    e35fda43ab7c8489fc167f5b559be00d7a871ed1b922e871eb603b4f34054d8e

    SHA512

    a0126ce5f12de785e063049704f698b0fa9cbf0f00951d1abdc6cdbb19dcd5027bceb02a722e14fdb4aaff2703c17ecc8ea50f0f01266cd95d199eb95d11e0b0

  • memory/4424-23-0x000000000041D000-0x00000000008AE000-memory.dmp

    Filesize

    4.6MB

  • memory/4424-6-0x0000000003030000-0x0000000003031000-memory.dmp

    Filesize

    4KB

  • memory/4424-5-0x0000000003020000-0x0000000003021000-memory.dmp

    Filesize

    4KB

  • memory/4424-4-0x0000000003010000-0x0000000003011000-memory.dmp

    Filesize

    4KB

  • memory/4424-8-0x0000000000400000-0x00000000010B8000-memory.dmp

    Filesize

    12.7MB

  • memory/4424-3-0x0000000001830000-0x0000000001831000-memory.dmp

    Filesize

    4KB

  • memory/4424-2-0x0000000001820000-0x0000000001821000-memory.dmp

    Filesize

    4KB

  • memory/4424-1-0x0000000001810000-0x0000000001811000-memory.dmp

    Filesize

    4KB

  • memory/4424-0-0x000000000041D000-0x00000000008AE000-memory.dmp

    Filesize

    4.6MB

  • memory/4424-7-0x0000000003040000-0x0000000003041000-memory.dmp

    Filesize

    4KB

  • memory/4820-32-0x0000000000400000-0x00000000010B8000-memory.dmp

    Filesize

    12.7MB

  • memory/4820-33-0x0000000000400000-0x00000000010B8000-memory.dmp

    Filesize

    12.7MB

  • memory/4820-30-0x0000000002EF0000-0x0000000002EF1000-memory.dmp

    Filesize

    4KB

  • memory/4820-29-0x0000000002EE0000-0x0000000002EE1000-memory.dmp

    Filesize

    4KB

  • memory/4820-28-0x0000000002ED0000-0x0000000002ED1000-memory.dmp

    Filesize

    4KB

  • memory/4820-27-0x0000000001510000-0x0000000001511000-memory.dmp

    Filesize

    4KB

  • memory/4820-26-0x00000000014E0000-0x00000000014E1000-memory.dmp

    Filesize

    4KB

  • memory/4820-25-0x00000000014D0000-0x00000000014D1000-memory.dmp

    Filesize

    4KB

  • memory/4820-24-0x00000000014C0000-0x00000000014C1000-memory.dmp

    Filesize

    4KB

  • memory/4820-34-0x0000000000400000-0x00000000010B8000-memory.dmp

    Filesize

    12.7MB