Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/09/2024, 01:10
Static task
static1
Behavioral task
behavioral1
Sample
c312afbb2e1533a50bd2d012b00b3540N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c312afbb2e1533a50bd2d012b00b3540N.exe
Resource
win10v2004-20240802-en
General
-
Target
c312afbb2e1533a50bd2d012b00b3540N.exe
-
Size
38KB
-
MD5
c312afbb2e1533a50bd2d012b00b3540
-
SHA1
afce6368844002243dfe893700bdf55e8cb65132
-
SHA256
24aa72540013e558407a21e6205ba9322ee3fc439036df233a1038d74aa650ac
-
SHA512
dbae260e1f7da4e4ed3075c27deeef3fa5e5b2594d9bff81f3ce485faa601cdaae690d9d9b98f4a9b785408e222a0a5accdf5db978d4f2499c425a7d8983af5f
-
SSDEEP
768:PylHQBrd12BT/ykykbvEI/1rQ+EIBHvY4HCmEZ7KDZn4U:alw5+Lrv7tZdvY4Iw
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c312afbb2e1533a50bd2d012b00b3540N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msinfo32.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\CompatibleIDs msinfo32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 msinfo32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID msinfo32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\CompatibleIDs msinfo32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 msinfo32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID msinfo32.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msinfo32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msinfo32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\ECFirmwareMajorRelease msinfo32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3576 c312afbb2e1533a50bd2d012b00b3540N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3576 wrote to memory of 2580 3576 c312afbb2e1533a50bd2d012b00b3540N.exe 84 PID 3576 wrote to memory of 2580 3576 c312afbb2e1533a50bd2d012b00b3540N.exe 84 PID 3576 wrote to memory of 2580 3576 c312afbb2e1533a50bd2d012b00b3540N.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\c312afbb2e1533a50bd2d012b00b3540N.exe"C:\Users\Admin\AppData\Local\Temp\c312afbb2e1533a50bd2d012b00b3540N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3576 -
C:\Windows\SysWOW64\msinfo32.exemmc.exe2⤵
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
- Enumerates system info in registry
PID:2580
-