Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
108s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01/09/2024, 08:59
Static task
static1
Behavioral task
behavioral1
Sample
3673c4e11b206790d884eedcaced0e58d19bf08b6554c8df64725aba2573240e.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3673c4e11b206790d884eedcaced0e58d19bf08b6554c8df64725aba2573240e.exe
Resource
win10v2004-20240802-en
General
-
Target
3673c4e11b206790d884eedcaced0e58d19bf08b6554c8df64725aba2573240e.exe
-
Size
919KB
-
MD5
3f88e4466cf3ce4d19113304b28f78f4
-
SHA1
d6ed629b26e37f138ae62511338be903f4ebdb86
-
SHA256
3673c4e11b206790d884eedcaced0e58d19bf08b6554c8df64725aba2573240e
-
SHA512
3827993b1e9a0fb15e02369947b026812069453733f913b01be33202422d17535c98f6635c93ae5b275924ca1b4f87d1e711d7be9e4e5d43eb39cf2342fe1069
-
SSDEEP
12288:8uPUTLYcAaUMhUhLupXshh1PEd5hOoXpJePfqw6gmQNhxAoRYn:8uPmLDUMihIXCE5Fi76gxh8
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation Isass.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation 3673c4e11b206790d884eedcaced0e58d19bf08b6554c8df64725aba2573240e.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation Isass.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation 3673c4e11b206790d884eedcaced0e58d19bf08b6554c8df64725aba2573240e.exe -
Executes dropped EXE 3 IoCs
pid Process 4556 Isass.exe 2096 Isass.exe 2680 Isass.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Isass.exe = "C:\\Users\\Public\\Microsoft Build\\Isass.exe" 3673c4e11b206790d884eedcaced0e58d19bf08b6554c8df64725aba2573240e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Isass.exe = "C:\\Users\\Public\\Microsoft Build\\Isass.exe" 3673c4e11b206790d884eedcaced0e58d19bf08b6554c8df64725aba2573240e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Isass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3673c4e11b206790d884eedcaced0e58d19bf08b6554c8df64725aba2573240e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Isass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Isass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3673c4e11b206790d884eedcaced0e58d19bf08b6554c8df64725aba2573240e.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 2340 3673c4e11b206790d884eedcaced0e58d19bf08b6554c8df64725aba2573240e.exe 2340 3673c4e11b206790d884eedcaced0e58d19bf08b6554c8df64725aba2573240e.exe 4556 Isass.exe 4556 Isass.exe 2096 Isass.exe 2096 Isass.exe 2096 Isass.exe 2096 Isass.exe 2096 Isass.exe 2096 Isass.exe 1548 3673c4e11b206790d884eedcaced0e58d19bf08b6554c8df64725aba2573240e.exe 1548 3673c4e11b206790d884eedcaced0e58d19bf08b6554c8df64725aba2573240e.exe 2680 Isass.exe 2680 Isass.exe 2680 Isass.exe 2680 Isass.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2340 wrote to memory of 4556 2340 3673c4e11b206790d884eedcaced0e58d19bf08b6554c8df64725aba2573240e.exe 84 PID 2340 wrote to memory of 4556 2340 3673c4e11b206790d884eedcaced0e58d19bf08b6554c8df64725aba2573240e.exe 84 PID 2340 wrote to memory of 4556 2340 3673c4e11b206790d884eedcaced0e58d19bf08b6554c8df64725aba2573240e.exe 84 PID 2340 wrote to memory of 2096 2340 3673c4e11b206790d884eedcaced0e58d19bf08b6554c8df64725aba2573240e.exe 85 PID 2340 wrote to memory of 2096 2340 3673c4e11b206790d884eedcaced0e58d19bf08b6554c8df64725aba2573240e.exe 85 PID 2340 wrote to memory of 2096 2340 3673c4e11b206790d884eedcaced0e58d19bf08b6554c8df64725aba2573240e.exe 85 PID 2096 wrote to memory of 1548 2096 Isass.exe 87 PID 2096 wrote to memory of 1548 2096 Isass.exe 87 PID 2096 wrote to memory of 1548 2096 Isass.exe 87 PID 1548 wrote to memory of 2680 1548 3673c4e11b206790d884eedcaced0e58d19bf08b6554c8df64725aba2573240e.exe 88 PID 1548 wrote to memory of 2680 1548 3673c4e11b206790d884eedcaced0e58d19bf08b6554c8df64725aba2573240e.exe 88 PID 1548 wrote to memory of 2680 1548 3673c4e11b206790d884eedcaced0e58d19bf08b6554c8df64725aba2573240e.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\3673c4e11b206790d884eedcaced0e58d19bf08b6554c8df64725aba2573240e.exe"C:\Users\Admin\AppData\Local\Temp\3673c4e11b206790d884eedcaced0e58d19bf08b6554c8df64725aba2573240e.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4556
-
-
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\3673c4e11b206790d884eedcaced0e58d19bf08b6554c8df64725aba2573240e.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\3673c4e11b206790d884eedcaced0e58d19bf08b6554c8df64725aba2573240e.exe"C:\Users\Admin\AppData\Local\Temp\3673c4e11b206790d884eedcaced0e58d19bf08b6554c8df64725aba2573240e.exe"3⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\3673c4e11b206790d884eedcaced0e58d19bf08b6554c8df64725aba2573240e.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2680
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD564e880e11e8cfe3620083ba6ec90c64e
SHA15d5490068ea3eb979efb15469fa264a1b85eb2bf
SHA256c7df1005559696adb0cc70eb4af48dda09bec8b9b5379b127a815a498dc86a88
SHA512cd3c46b041d9bf3a7a273ac914fae7740d7e8ee4807c9fe1ffb3ecd70733991bccaf81a3cdbf297f9a3e2f18aea75cd8dfc776d878a163bc5917190469b21315
-
C:\Users\Admin\AppData\Local\Temp\3673c4e11b206790d884eedcaced0e58d19bf08b6554c8df64725aba2573240e.exe
Filesize284KB
MD5290ab3601b988b124f4911778d89626a
SHA191082fca98f044b2d98ffd66930215f8e1852884
SHA256dcb9736a6019fa15abe55507d4ce1d22443683cf474b72de204947fb1823c736
SHA512aec8c1ebc47525f49882dc04fbb4b8e24f8bc506430c106ca66ef68f02ca8c7faca0ba2e7c649e9a631ad37eae2844484274ad42e78b90a446161197cb95ef41
-
Filesize
624KB
MD5b01405cb348a3cd105c66cc390ff7fb3
SHA1a706e33fc2258aa2618953963d468f27760a8ad5
SHA256345dc0e46f05f78cd67044d6af423a6d3e4e04a28112f0bb0379ef3e5f63c2b4
SHA5126aa7b7dc1d0adf5df7c2ffe68faa5bfbeb7016621ebefccdad7e0b573ec6290a08b4f90e44318c577c80cf009b808e72be5acb5f45e007b340b01f641c107740