Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/09/2024, 19:30
Static task
static1
Behavioral task
behavioral1
Sample
9d14d45b1c7ff364f29da917b355bd70N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9d14d45b1c7ff364f29da917b355bd70N.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
9d14d45b1c7ff364f29da917b355bd70N.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
9d14d45b1c7ff364f29da917b355bd70N.exe
Resource
win11-20240802-en
General
-
Target
9d14d45b1c7ff364f29da917b355bd70N.exe
-
Size
9KB
-
MD5
9d14d45b1c7ff364f29da917b355bd70
-
SHA1
8e90c2f79fd5e5eb12ff9230936e6c91c449bd9b
-
SHA256
b4fa640fdcf458fb0b3a3aef66225bcc581e8be3b5538aad4341cd8b51e7c111
-
SHA512
aa89d9629e3cf4779f07dd368b4741a91a975ad82d0b5190020bce2ad72ff48f92f2ab4c548c2c1b5ac37d5b4ab47cb3f879f887851b61e83bc034d515167c44
-
SSDEEP
96:zb+u4l46fPl6C8w/Z3cy4cfnp35veaiUgCsGZkM6m2As1c4SYgXuN4yYjgAYX:WHO6V6CXZSYp0aiZCpc1ZSYgXu2fjmX
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation 9d14d45b1c7ff364f29da917b355bd70N.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation ffengh.exe -
Executes dropped EXE 1 IoCs
pid Process 4636 ffengh.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9d14d45b1c7ff364f29da917b355bd70N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffengh.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4024 wrote to memory of 4636 4024 9d14d45b1c7ff364f29da917b355bd70N.exe 84 PID 4024 wrote to memory of 4636 4024 9d14d45b1c7ff364f29da917b355bd70N.exe 84 PID 4024 wrote to memory of 4636 4024 9d14d45b1c7ff364f29da917b355bd70N.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\9d14d45b1c7ff364f29da917b355bd70N.exe"C:\Users\Admin\AppData\Local\Temp\9d14d45b1c7ff364f29da917b355bd70N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Users\Admin\AppData\Local\Temp\ffengh.exe"C:\Users\Admin\AppData\Local\Temp\ffengh.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4636
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD52bec0198dc26f4917942d7411ad0c69f
SHA115e56a0ea9ab76730155e0709b5a4495a0a7ce97
SHA256bcae950fe39b0c29df0679aa43a0e83f8a0bf5ae0c1f2a935d9d4ef146b4423d
SHA5124c44e5a4ccb1b8e11e253de15ba5b5ea09ff00e3568bfd9692374d659c63ee313dafa278e2853f59b24a5b6155d0bc00faaf0f47b004a019f8776f5ea5737d44