Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03/09/2024, 20:54
Static task
static1
Behavioral task
behavioral1
Sample
d72e82a9bbbb97a0dc79a669c2f0e1e0b9ec7d6fb2bb2e71056fdf7e07d223c2.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d72e82a9bbbb97a0dc79a669c2f0e1e0b9ec7d6fb2bb2e71056fdf7e07d223c2.exe
Resource
win10v2004-20240802-en
General
-
Target
d72e82a9bbbb97a0dc79a669c2f0e1e0b9ec7d6fb2bb2e71056fdf7e07d223c2.exe
-
Size
16KB
-
MD5
9e46230c789b8a09fcac100c09cb3582
-
SHA1
75665fb2aa80eb940ce9d6f51e23fa9c38e34a38
-
SHA256
d72e82a9bbbb97a0dc79a669c2f0e1e0b9ec7d6fb2bb2e71056fdf7e07d223c2
-
SHA512
bbf6232f1981e255e27c40e9b554dd2f4801b89180bd0fed16a53a74546814cc4ae2d0af95ce8cda3d28b9b0121184ecc983eb8f7213c339ba04c66bb96fe667
-
SSDEEP
384:hdtXWiJCQxsEwvK3RpSSHuGQG2Rqm4YhYETPq:hDXWipuE+K3/SSHgxmOy
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation d72e82a9bbbb97a0dc79a669c2f0e1e0b9ec7d6fb2bb2e71056fdf7e07d223c2.exe Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation DEM8BC5.exe Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation DEME280.exe Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation DEM389F.exe Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation DEM8EAE.exe Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation DEME4CD.exe -
Executes dropped EXE 6 IoCs
pid Process 2616 DEM8BC5.exe 4088 DEME280.exe 3016 DEM389F.exe 3316 DEM8EAE.exe 828 DEME4CD.exe 4908 DEM3ADC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM8BC5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEME280.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM389F.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM8EAE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEME4CD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM3ADC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d72e82a9bbbb97a0dc79a669c2f0e1e0b9ec7d6fb2bb2e71056fdf7e07d223c2.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4276 wrote to memory of 2616 4276 d72e82a9bbbb97a0dc79a669c2f0e1e0b9ec7d6fb2bb2e71056fdf7e07d223c2.exe 95 PID 4276 wrote to memory of 2616 4276 d72e82a9bbbb97a0dc79a669c2f0e1e0b9ec7d6fb2bb2e71056fdf7e07d223c2.exe 95 PID 4276 wrote to memory of 2616 4276 d72e82a9bbbb97a0dc79a669c2f0e1e0b9ec7d6fb2bb2e71056fdf7e07d223c2.exe 95 PID 2616 wrote to memory of 4088 2616 DEM8BC5.exe 99 PID 2616 wrote to memory of 4088 2616 DEM8BC5.exe 99 PID 2616 wrote to memory of 4088 2616 DEM8BC5.exe 99 PID 4088 wrote to memory of 3016 4088 DEME280.exe 101 PID 4088 wrote to memory of 3016 4088 DEME280.exe 101 PID 4088 wrote to memory of 3016 4088 DEME280.exe 101 PID 3016 wrote to memory of 3316 3016 DEM389F.exe 103 PID 3016 wrote to memory of 3316 3016 DEM389F.exe 103 PID 3016 wrote to memory of 3316 3016 DEM389F.exe 103 PID 3316 wrote to memory of 828 3316 DEM8EAE.exe 105 PID 3316 wrote to memory of 828 3316 DEM8EAE.exe 105 PID 3316 wrote to memory of 828 3316 DEM8EAE.exe 105 PID 828 wrote to memory of 4908 828 DEME4CD.exe 107 PID 828 wrote to memory of 4908 828 DEME4CD.exe 107 PID 828 wrote to memory of 4908 828 DEME4CD.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\d72e82a9bbbb97a0dc79a669c2f0e1e0b9ec7d6fb2bb2e71056fdf7e07d223c2.exe"C:\Users\Admin\AppData\Local\Temp\d72e82a9bbbb97a0dc79a669c2f0e1e0b9ec7d6fb2bb2e71056fdf7e07d223c2.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Users\Admin\AppData\Local\Temp\DEM8BC5.exe"C:\Users\Admin\AppData\Local\Temp\DEM8BC5.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\DEME280.exe"C:\Users\Admin\AppData\Local\Temp\DEME280.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Users\Admin\AppData\Local\Temp\DEM389F.exe"C:\Users\Admin\AppData\Local\Temp\DEM389F.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\DEM8EAE.exe"C:\Users\Admin\AppData\Local\Temp\DEM8EAE.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3316 -
C:\Users\Admin\AppData\Local\Temp\DEME4CD.exe"C:\Users\Admin\AppData\Local\Temp\DEME4CD.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Users\Admin\AppData\Local\Temp\DEM3ADC.exe"C:\Users\Admin\AppData\Local\Temp\DEM3ADC.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4908
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD536c83d28df67f697f78154760af8985d
SHA1c8027dc29aa24fd50e0274405aa5bee391ea52a0
SHA2563c8d931896b1d0e3478190b1df83354bf3397f5c36a1f9464a906bef47e3de2f
SHA5123481ad8bab49493e9c8e430043b2ecaa3152b8c29fa47bce3d7238574b49f7b8a0d879fc24cb236f34ba4a331ea32ad033f961c4d1729452e45d675211c445d9
-
Filesize
16KB
MD570465746351b4817737007896bcb7b07
SHA1359dbb58c90b463891f35cd89961d9277c9438bd
SHA256284fe8c7fbfcdf6eee2bb2ab53845bc3b529d8bceac1acbf4a1312dfc2ffcc08
SHA5124a902f0d82e87dafb0880bd341e19da5f1b3a6f5e45f4ead1dae92563123a991927f4d1a043d156ca55280acdebd09fc9c11f461aee6a3632add5347821f3f60
-
Filesize
16KB
MD5f62adfeabd081cdee2cd75f253c572b4
SHA17fb306657408f522ad873d378ccd03148f02505e
SHA256919a7335fa58c4e6a1bb0444e9c4d1427ccbb3427be8130e7e2fe9afe1db60d3
SHA5123b1854637a6a079e8639f7ab9524a43d9c5951aeffe7499765de771ae3ecdfe5598df0d89e1be276d5a98239ae1a40527689f2cbd105ead0c949d82b982dbc0e
-
Filesize
16KB
MD513a79caa98d8904b4208e782284449b8
SHA1e76c4bed0e4eedd575a1b2d52c9f0c0e35f95482
SHA256d305be573f5826430b7f00def5266a1c264f7f48d8cbd7ca70d20dd99f718063
SHA51225e5ec6319a95dcc03870bca08803b29ec0911623ba358f20ce46d82daf84f6573487a4004b33cb877d859c8266e43032011f0c4888257461c97efd7f33b803c
-
Filesize
16KB
MD5ff133271c54a40c1e5ecdfeb5f39de86
SHA112a423ab23f76480b7a84816ef13439927cd00f3
SHA25635b65260549b47a4622db121f0fd676eb37b6a75f1ee98ef9b0d60943b1b2646
SHA5123a0fb2875243394ab2a72e087a2c9462a8f41db95dfc041201dd978a33ba413e5f4a2b4a17b538f7e2351c11d519c6c71d1f0f4da19fb9f70a80fff7d9ad7b2f
-
Filesize
16KB
MD5c88b5bb1af0b3781bf7309bcec9833eb
SHA1506411728c5ccb8d9a2599e6fbb6c5d53f03b35b
SHA256c08ffdf8a70f2d3f93e889bfe9d37332e04a57ff75ebd312d8e946f7c0af2dbb
SHA512080a87d606ab43c189b56a37e40a28cb038936132259da111533c15e65b2a6d8fdd6fe372ad7f3fe469fe32fa586dcf33bfd5a42941c38126510e230567afad9