Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03/09/2024, 06:21
Static task
static1
Behavioral task
behavioral1
Sample
5761b48a873f44d6eb34916f429536e24a7f955f8a81ce006f93a863c1f8e7df.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5761b48a873f44d6eb34916f429536e24a7f955f8a81ce006f93a863c1f8e7df.exe
Resource
win10v2004-20240802-en
General
-
Target
5761b48a873f44d6eb34916f429536e24a7f955f8a81ce006f93a863c1f8e7df.exe
-
Size
15KB
-
MD5
7c58ed3ec40b9640da0426a8ec30efe5
-
SHA1
6d2b6b57e9ac6674e0ef5e98cee9fe0e54d9bd2b
-
SHA256
5761b48a873f44d6eb34916f429536e24a7f955f8a81ce006f93a863c1f8e7df
-
SHA512
78794b13879b2ce14042587d884b4a8765767de06587cdc5a979b11df00ac94ac8a0fe1b172ba5ad2f99390e5ca5f46ab91c56f2c33a5f2662d389505122c3b7
-
SSDEEP
384:hdtXWiJCQxsEwvK3RpSSHuGQG2Rqm4Yhhid:hDXWipuE+K3/SSHgxLid
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation 5761b48a873f44d6eb34916f429536e24a7f955f8a81ce006f93a863c1f8e7df.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation DEMB640.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation DEME05.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation DEM6433.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation DEMBAEE.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation DEM113C.exe -
Executes dropped EXE 6 IoCs
pid Process 3176 DEMB640.exe 2512 DEME05.exe 3892 DEM6433.exe 2260 DEMBAEE.exe 4824 DEM113C.exe 1308 DEM675B.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM113C.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM675B.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5761b48a873f44d6eb34916f429536e24a7f955f8a81ce006f93a863c1f8e7df.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEMB640.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEME05.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM6433.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEMBAEE.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3512 wrote to memory of 3176 3512 5761b48a873f44d6eb34916f429536e24a7f955f8a81ce006f93a863c1f8e7df.exe 94 PID 3512 wrote to memory of 3176 3512 5761b48a873f44d6eb34916f429536e24a7f955f8a81ce006f93a863c1f8e7df.exe 94 PID 3512 wrote to memory of 3176 3512 5761b48a873f44d6eb34916f429536e24a7f955f8a81ce006f93a863c1f8e7df.exe 94 PID 3176 wrote to memory of 2512 3176 DEMB640.exe 98 PID 3176 wrote to memory of 2512 3176 DEMB640.exe 98 PID 3176 wrote to memory of 2512 3176 DEMB640.exe 98 PID 2512 wrote to memory of 3892 2512 DEME05.exe 100 PID 2512 wrote to memory of 3892 2512 DEME05.exe 100 PID 2512 wrote to memory of 3892 2512 DEME05.exe 100 PID 3892 wrote to memory of 2260 3892 DEM6433.exe 102 PID 3892 wrote to memory of 2260 3892 DEM6433.exe 102 PID 3892 wrote to memory of 2260 3892 DEM6433.exe 102 PID 2260 wrote to memory of 4824 2260 DEMBAEE.exe 104 PID 2260 wrote to memory of 4824 2260 DEMBAEE.exe 104 PID 2260 wrote to memory of 4824 2260 DEMBAEE.exe 104 PID 4824 wrote to memory of 1308 4824 DEM113C.exe 106 PID 4824 wrote to memory of 1308 4824 DEM113C.exe 106 PID 4824 wrote to memory of 1308 4824 DEM113C.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\5761b48a873f44d6eb34916f429536e24a7f955f8a81ce006f93a863c1f8e7df.exe"C:\Users\Admin\AppData\Local\Temp\5761b48a873f44d6eb34916f429536e24a7f955f8a81ce006f93a863c1f8e7df.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Users\Admin\AppData\Local\Temp\DEMB640.exe"C:\Users\Admin\AppData\Local\Temp\DEMB640.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3176 -
C:\Users\Admin\AppData\Local\Temp\DEME05.exe"C:\Users\Admin\AppData\Local\Temp\DEME05.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\DEM6433.exe"C:\Users\Admin\AppData\Local\Temp\DEM6433.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\Users\Admin\AppData\Local\Temp\DEMBAEE.exe"C:\Users\Admin\AppData\Local\Temp\DEMBAEE.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\DEM113C.exe"C:\Users\Admin\AppData\Local\Temp\DEM113C.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Users\Admin\AppData\Local\Temp\DEM675B.exe"C:\Users\Admin\AppData\Local\Temp\DEM675B.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1308
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD5f296e879e3145cb64045d3404bda4975
SHA1e03fd4297c433cbc6b6c014e91cd3130616362c3
SHA256e30d1111c4aa811c7cd2fffc4fb8f5292db2b8b84ed7e9aeb9b950f04cfff0df
SHA5128b2b021e3145e39507c509cb8ed57847a8b1c6acfa7e50776549236c78f1ad20367fb53a660114f50a3373e65027654eddbce18894dc4d4ae019017518623edb
-
Filesize
15KB
MD582c3f5f401132c1d3f7a11836beff6c6
SHA17ce5afaf87ead9568d29e6a6e38982404540ca15
SHA25694498af0ab1d6ee2a155ab70d39f7bacc00845e4d89fd6fa4ce377b43781883a
SHA5124de54327e6ccecec8ae1083d13caca93f47421ad924d75dd7bfd038bc72561a6e60c2423226b6f61299bca4c0369e3d3180973ffe3e98977e43c9515f0d57909
-
Filesize
15KB
MD533dcd74824fa44fcfb070d2c54a473d7
SHA1eef974c32dfd410b20e83ec469d9329769e2ac7a
SHA2564dadffcf59a22817a6a47f0ea00b17590edb01a70642744cd9f78716108c6a6b
SHA5124c86c7bf445fc38599c364dcf395c78872fa0acb5e6ffbb1d09706e6ec76346f7389345f6784201e759672c4d0e8f865f5acff3ec15be490c9a46bb355b5c4b5
-
Filesize
15KB
MD5ec417bdd94ca997b40b9937c3c1bbbf3
SHA16bb5e354f73787e03e4921d60ca06e57245c273a
SHA256e7383189bcde5d3b68c4d3e1b166a3e95733fcef66c712428f98271e552ec93a
SHA5124eecf9df6be7558d9d5aad5ac1535f340d6f4d862c24e61564b120269826c88d363a6c6fe328f93c49146410dd0a9437c50490a66398e4d58df3169ebdd13499
-
Filesize
15KB
MD5221cbf958135fd9f3e2d5b2c16504ad3
SHA1ee211059c92dc0e7e2b452007c7f8b7f14ecf7ba
SHA256a3f8a83ac7d6b1e10b67cb103156fe76cdb74f9275aedcbe49791ef98b5662a0
SHA512de0574a397deb62031cfb45f19d901bc3a86b84deea9306488706d0ebbfd817fb49e45461a894e4dd58ac2b1fff872e708230c4362fda997883502b31a675373
-
Filesize
15KB
MD597caa930b159e0c85b4736cc67150b16
SHA18d900c009cbdebcdd9cc10e5280a1c234a1b44cb
SHA256e8ec3b5b4ba2cf85391fd683d4a041a4a713e779861df44f4a150a156d74756c
SHA512d77573d36e9f1e0e4f8feaa432c06b3ed541b9c35868195248f736978597023b1c1e6dbfc9f273621591301c1ff286c10f24496c68ce440344f3d8a8affdde3b