Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01/09/2024, 14:42
Static task
static1
Behavioral task
behavioral1
Sample
1d5a70e1e61c880a33f5277c019d28f1a91534894f6c60d59069f500ea3276ed.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
1d5a70e1e61c880a33f5277c019d28f1a91534894f6c60d59069f500ea3276ed.exe
Resource
win10v2004-20240802-en
General
-
Target
1d5a70e1e61c880a33f5277c019d28f1a91534894f6c60d59069f500ea3276ed.exe
-
Size
14KB
-
MD5
b88828bb90c23342fca74b2e0f7a8491
-
SHA1
12dee435022fa6e516eeb5281e47cd362844dbe9
-
SHA256
1d5a70e1e61c880a33f5277c019d28f1a91534894f6c60d59069f500ea3276ed
-
SHA512
16a39b324fc33a0b62603be60470bf75c9cb7fbde4ecd4ba2e717069a7f91423367c7370a6485828f0b1fdd1f52b2b8015a01de9a65e0810dbcf3274730eb1b7
-
SSDEEP
384:hdtXWiJCQxsEwvK3RpSSHuGQG2Rqm4YhYJBX:hDXWipuE+K3/SSHgxmbX
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation DEMCD7.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation 1d5a70e1e61c880a33f5277c019d28f1a91534894f6c60d59069f500ea3276ed.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation DEMB42D.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation DEMB07.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation DEM6155.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation DEMB6D8.exe -
Executes dropped EXE 6 IoCs
pid Process 364 DEMB42D.exe 3232 DEMB07.exe 1312 DEM6155.exe 3888 DEMB6D8.exe 972 DEMCD7.exe 1504 DEM6325.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM6155.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEMB6D8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEMCD7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM6325.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1d5a70e1e61c880a33f5277c019d28f1a91534894f6c60d59069f500ea3276ed.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEMB42D.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEMB07.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2416 wrote to memory of 364 2416 1d5a70e1e61c880a33f5277c019d28f1a91534894f6c60d59069f500ea3276ed.exe 96 PID 2416 wrote to memory of 364 2416 1d5a70e1e61c880a33f5277c019d28f1a91534894f6c60d59069f500ea3276ed.exe 96 PID 2416 wrote to memory of 364 2416 1d5a70e1e61c880a33f5277c019d28f1a91534894f6c60d59069f500ea3276ed.exe 96 PID 364 wrote to memory of 3232 364 DEMB42D.exe 101 PID 364 wrote to memory of 3232 364 DEMB42D.exe 101 PID 364 wrote to memory of 3232 364 DEMB42D.exe 101 PID 3232 wrote to memory of 1312 3232 DEMB07.exe 104 PID 3232 wrote to memory of 1312 3232 DEMB07.exe 104 PID 3232 wrote to memory of 1312 3232 DEMB07.exe 104 PID 1312 wrote to memory of 3888 1312 DEM6155.exe 106 PID 1312 wrote to memory of 3888 1312 DEM6155.exe 106 PID 1312 wrote to memory of 3888 1312 DEM6155.exe 106 PID 3888 wrote to memory of 972 3888 DEMB6D8.exe 112 PID 3888 wrote to memory of 972 3888 DEMB6D8.exe 112 PID 3888 wrote to memory of 972 3888 DEMB6D8.exe 112 PID 972 wrote to memory of 1504 972 DEMCD7.exe 114 PID 972 wrote to memory of 1504 972 DEMCD7.exe 114 PID 972 wrote to memory of 1504 972 DEMCD7.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d5a70e1e61c880a33f5277c019d28f1a91534894f6c60d59069f500ea3276ed.exe"C:\Users\Admin\AppData\Local\Temp\1d5a70e1e61c880a33f5277c019d28f1a91534894f6c60d59069f500ea3276ed.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\DEMB42D.exe"C:\Users\Admin\AppData\Local\Temp\DEMB42D.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:364 -
C:\Users\Admin\AppData\Local\Temp\DEMB07.exe"C:\Users\Admin\AppData\Local\Temp\DEMB07.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Users\Admin\AppData\Local\Temp\DEM6155.exe"C:\Users\Admin\AppData\Local\Temp\DEM6155.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Users\Admin\AppData\Local\Temp\DEMB6D8.exe"C:\Users\Admin\AppData\Local\Temp\DEMB6D8.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Users\Admin\AppData\Local\Temp\DEMCD7.exe"C:\Users\Admin\AppData\Local\Temp\DEMCD7.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Users\Admin\AppData\Local\Temp\DEM6325.exe"C:\Users\Admin\AppData\Local\Temp\DEM6325.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1504
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD52d1dba6f147bbc04148e75507a97e9e3
SHA1760741c99419ba1c579e122020722e4283837dd9
SHA256481f4234b49b79c40f2c8bae111c6457468fca7824ff704f3dda1d626c0ab175
SHA5120a4df8f82627dbd8dcc439178cb199f2fd7f65a651228af950eb15dd87069d6aac91606957c13a72649c1623245a67ed45e707cafc44bcea9ba52aeff307fb5e
-
Filesize
15KB
MD58cc0ec61bc708201bd08f7170a83d91b
SHA1980ee9b3b3287bdd23a7c16990d5677dbdaeb75e
SHA2565e623e124d8b32e86a68b65c042aafe4582e76574eebb035ce3c5683e57bfa76
SHA512cd8160729f75bcbb4d91414f82f9de37d17d289c9560d5072ec2751b38f371cc5865da083ec34131633f00e1a2d878a5965d8c2bd36e6598b529e093302d5369
-
Filesize
14KB
MD5418c96ab97905c33b9911b20b2a13499
SHA1bcba7fdee19f511057f5c560f3533af2cc67b65c
SHA256ebab36315e1582afc596ab05b1bbb37d413f40f3b0f3f07d17c0f90f2fae9e17
SHA512c17b0236293978528be78925daab4a060ca226a57c33a21a640513ae380ee53704917056467eef2cf78102fd22f31dad4527d5eacdf8b4a720a4ea25a2dbab83
-
Filesize
14KB
MD52e31e6670c4490e5a5eeaea27b24db6c
SHA1e14756868e0a9c23176b5bbb769546bc0c9c506d
SHA25672ce77194a689cd69e32fdd18b39aec7edc9a7cec4eae2b691d615f19d4ae04b
SHA5123119bbd87f92bcf141deadd69a6f626ef75423a5f9be1ceb2f96406bcbd1cdc77b0ba865c273346b6a4fe4116cffdec98a5cc899d26c32653bd2e006bc59dba2
-
Filesize
14KB
MD56dcd2e1f560bbb8f8935f4af3fd0db07
SHA1c74710bb9298f7080ad9c5a9372151ba830c0fd5
SHA256e936ed40f4176fee35432b4178fa20ab470630daaee245854dce3972a8004f29
SHA5127cfd703aa3f3543c9970d727365e2c6ab2c94e97945787d15a31f1c55d46d65d33573e08d213987b244a81a0b7488968569b35719ae279cf5cff92ffab50701e
-
Filesize
14KB
MD54d07f95b7e4585f28782e36d440f4879
SHA1da9c88e2e071f2a896755d89ab30d94affc8bad0
SHA25615148633144e7459c19e868bcd63ae86bcbcd63dbc6b8d7cc8d0020b7f2406c2
SHA512f8f0c2233fa6fa6cac9dea193e3806e5899d4487d2d04c7d9809f026487860feac30da93edbc30e1aaed6503a6a7c2228537a346b2755dc031cbab94ee898a1f