Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/09/2024, 23:53
Static task
static1
Behavioral task
behavioral1
Sample
d3a4be43fda6285a85ff94fa62f8daea60ef31ca27384ecbb35a2793e3214ef7.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d3a4be43fda6285a85ff94fa62f8daea60ef31ca27384ecbb35a2793e3214ef7.exe
Resource
win10v2004-20240802-en
General
-
Target
d3a4be43fda6285a85ff94fa62f8daea60ef31ca27384ecbb35a2793e3214ef7.exe
-
Size
7.9MB
-
MD5
8d1307a9e1186f89399e2251998f1494
-
SHA1
d2614c64b38c812e1ceafdac6b5527b21dc4c6c3
-
SHA256
d3a4be43fda6285a85ff94fa62f8daea60ef31ca27384ecbb35a2793e3214ef7
-
SHA512
496f235c39695b88358c96891fc61ca0440130dd9cfecdbc68d8c2747c9cdfac8b3d2542c49df82d01b3192ce04d5e343584df711e0049626f2c2028c78241b2
-
SSDEEP
196608:8Eazg7DSmEazg7DSmEazg7DSmEazg7DSN:Og7uYg7uYg7uYg7uN
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation d3a4be43fda6285a85ff94fa62f8daea60ef31ca27384ecbb35a2793e3214ef7.exe -
Executes dropped EXE 3 IoCs
pid Process 2780 7D57AD13E21.exe 4520 Scegli_nome_allegato.exe 3452 7D57AD13E21.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Update = "C:\\Users\\Admin\\AppData\\Roaming\\7D57AD13E21.exe" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2780 set thread context of 3452 2780 7D57AD13E21.exe 99 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d3a4be43fda6285a85ff94fa62f8daea60ef31ca27384ecbb35a2793e3214ef7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7D57AD13E21.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Scegli_nome_allegato.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7D57AD13E21.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch Scegli_nome_allegato.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" Scegli_nome_allegato.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Software\Microsoft\Internet Explorer\IESettingSync Scegli_nome_allegato.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" Scegli_nome_allegato.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 4492 reg.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4520 Scegli_nome_allegato.exe 4520 Scegli_nome_allegato.exe 4520 Scegli_nome_allegato.exe 3452 7D57AD13E21.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3732 wrote to memory of 4492 3732 d3a4be43fda6285a85ff94fa62f8daea60ef31ca27384ecbb35a2793e3214ef7.exe 94 PID 3732 wrote to memory of 4492 3732 d3a4be43fda6285a85ff94fa62f8daea60ef31ca27384ecbb35a2793e3214ef7.exe 94 PID 3732 wrote to memory of 4492 3732 d3a4be43fda6285a85ff94fa62f8daea60ef31ca27384ecbb35a2793e3214ef7.exe 94 PID 3732 wrote to memory of 2780 3732 d3a4be43fda6285a85ff94fa62f8daea60ef31ca27384ecbb35a2793e3214ef7.exe 96 PID 3732 wrote to memory of 2780 3732 d3a4be43fda6285a85ff94fa62f8daea60ef31ca27384ecbb35a2793e3214ef7.exe 96 PID 3732 wrote to memory of 2780 3732 d3a4be43fda6285a85ff94fa62f8daea60ef31ca27384ecbb35a2793e3214ef7.exe 96 PID 3732 wrote to memory of 4520 3732 d3a4be43fda6285a85ff94fa62f8daea60ef31ca27384ecbb35a2793e3214ef7.exe 97 PID 3732 wrote to memory of 4520 3732 d3a4be43fda6285a85ff94fa62f8daea60ef31ca27384ecbb35a2793e3214ef7.exe 97 PID 3732 wrote to memory of 4520 3732 d3a4be43fda6285a85ff94fa62f8daea60ef31ca27384ecbb35a2793e3214ef7.exe 97 PID 2780 wrote to memory of 3452 2780 7D57AD13E21.exe 99 PID 2780 wrote to memory of 3452 2780 7D57AD13E21.exe 99 PID 2780 wrote to memory of 3452 2780 7D57AD13E21.exe 99 PID 2780 wrote to memory of 3452 2780 7D57AD13E21.exe 99 PID 2780 wrote to memory of 3452 2780 7D57AD13E21.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3a4be43fda6285a85ff94fa62f8daea60ef31ca27384ecbb35a2793e3214ef7.exe"C:\Users\Admin\AppData\Local\Temp\d3a4be43fda6285a85ff94fa62f8daea60ef31ca27384ecbb35a2793e3214ef7.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "Windows Update" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe" /f2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4492
-
-
C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe"C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe"C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3452
-
-
-
C:\Users\Admin\AppData\Roaming\Scegli_nome_allegato.exe"C:\Users\Admin\AppData\Roaming\Scegli_nome_allegato.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4520
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.9MB
MD5d63afc68d65875ab85965419b7693a37
SHA180bce9248eb86682050c5cea6ff6412976015a64
SHA256dc1a66f9b90e50f041237889838b15613b20aa30a2492ef8404f7fcdcc282ca7
SHA512b0370123d8bb8ffe7e98a499681fe5f5da766634a7f0b84282395799ed57588ec268eb30b3dfa0d9a6424888f20282d6ddb967801f9fe05ad97ecaccf9a342fd
-
Filesize
1.0MB
MD5a2f259ceb892d3b0d1d121997c8927e3
SHA16e0a7239822b8d365d690a314f231286355f6cc6
SHA256ab01a333f38605cbcebd80e0a84ffae2803a9b4f6bebb1e9f773e949a87cb420
SHA5125ae1b60390c94c9e79d3b500a55b775d82556e599963d533170b9f35ad5cfa2df1b7d24de1890acf8e1e2c356830396091d46632dbc6ee43a7d042d4facb5dad