Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    116s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/08/2024, 00:27

General

  • Target

    a16ff17f73edf4b0ff82670f1b4f6a10N.exe

  • Size

    9.7MB

  • MD5

    a16ff17f73edf4b0ff82670f1b4f6a10

  • SHA1

    009538052666905a36c2c12c7caa58e83887afe1

  • SHA256

    646c0854f6d90d2c71c3ae9a73d4ea5e40c9d82790e0c5429b448a0afaccee75

  • SHA512

    2435e43ba87c78c9e6466afab9516a7b92d87dd22ca1814bd3fd314c31cf80127e70902f27f13f2e56eb3dd6555f09a4017d32ee8806f1f3b6b61589d6be16a0

  • SSDEEP

    196608:HGqnhgJuP3LAhCiVXOWvd6A1oMuWr45hrr2j:HS+LJYeJWGhrr2j

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 3 IoCs
  • Drops file in Program Files directory 39 IoCs
  • Drops file in Windows directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 60 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a16ff17f73edf4b0ff82670f1b4f6a10N.exe
    "C:\Users\Admin\AppData\Local\Temp\a16ff17f73edf4b0ff82670f1b4f6a10N.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    PID:2992

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARMAcrobat.exe

    Filesize

    9.6MB

    MD5

    ee21d144f6fd58b4b719e7bd95731378

    SHA1

    0ceaadf36f36e62ffab285373b4209173b74c4ef

    SHA256

    63a09ca84d6e446fb2ae5ebd90d218f67bdc81e9ed010cce8ca6b70cc62f5828

    SHA512

    7e5c47fd639d6f873ab88acd874051225c1e30d079c3b737480652835c73c7c921b2570b86d0b05be9b3ab1294becf24de3306efcaeac71385b80a4f875acd2e

  • C:\Program Files (x86)\Common Files\Microsoft Shared\ink\RCXC8D2.tmp

    Filesize

    9.7MB

    MD5

    a4a16d4de59ccc7c5cd7dcf3bde82140

    SHA1

    d08fc8424306bf50e2c6cfcc1192c76c7d14cf9f

    SHA256

    85c5d5246202790a992802fd4ba3bb13788847fe7118a15b12d317a522b925e5

    SHA512

    48bf4d7e9e13a85678d26ef91b5624c1de5514022ad48cf93f6b7df96ae80f489fa8f1784c8a26883b1acc2515725c91454e7523dde0000c9d9bc11a6814a355

  • C:\Program Files (x86)\Common Files\System\MicrosoftWAB3210.0.19041.1.160101.0800.exe

    Filesize

    9.6MB

    MD5

    31c76b46cc5925dcffddf51c97e134cc

    SHA1

    4113872f1c10d417b5f14679a4ffd5f93ba2b26e

    SHA256

    3dd85a6d7886e9aaf77505a9d6076feb6c3c701cda853bf039f78716d040c139

    SHA512

    fc6c3bcce87991507f31a330a6f3e0b43f2db487e3e062e9b73367a632a1910fdfdcff1585fa79cebcdae2946c5b3803cbda9589712e072a5a34534a8cdf9d99

  • C:\Program Files (x86)\Common Files\System\Ole DB\Windowsmsdaorar.exe

    Filesize

    9.7MB

    MD5

    a16ff17f73edf4b0ff82670f1b4f6a10

    SHA1

    009538052666905a36c2c12c7caa58e83887afe1

    SHA256

    646c0854f6d90d2c71c3ae9a73d4ea5e40c9d82790e0c5429b448a0afaccee75

    SHA512

    2435e43ba87c78c9e6466afab9516a7b92d87dd22ca1814bd3fd314c31cf80127e70902f27f13f2e56eb3dd6555f09a4017d32ee8806f1f3b6b61589d6be16a0

  • C:\Windows\assembly\GAC_MSIL\System.Web.DynamicData.Design\3.5.0.0__31bf3856ad364e35\MicrosoftDesign.exe

    Filesize

    9.7MB

    MD5

    7ca67d6cdf9362aa7a6bb00cbd741025

    SHA1

    8e957872f735148e5b98a9671b35771c113e6f63

    SHA256

    621393bbca01af2512e0ae3de5bfbdd8c17bcf31cf19fe337e8378bd63c20d57

    SHA512

    b3794e3f9d655b88f679e927216c550080b82532f356a80a60be842690d7a2e1017d18920249169ebff49a4e8602af19e864c07acc27e7aec26ec44f3bc19b2d