Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 05:13
Static task
static1
Behavioral task
behavioral1
Sample
82da066114537330ed9ec88079dfe890N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
82da066114537330ed9ec88079dfe890N.exe
Resource
win10v2004-20240802-en
General
-
Target
82da066114537330ed9ec88079dfe890N.exe
-
Size
874KB
-
MD5
82da066114537330ed9ec88079dfe890
-
SHA1
472794825c6a584f637086ac254f8af30d264f63
-
SHA256
4b7110ba9edcf3051cdc8ccea3181a38a59113c2e0a64f0767c3d31e7841861e
-
SHA512
b23ebc659dee31f07d48b00283ea5e465119caf7cc8e8840932aa83efe5a012eefce01bcd78b61f2cff9207a0faf9c6aeb5cc170399a137de0a2222c763006e0
-
SSDEEP
12288:eYIW0p98Oh8P7h82e9Kcp0JopWOV6zt9f/YfYIWuOh8P7h8:uW298E8u2NY0ipWOi9fkWuE8u
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation 8107.tmp -
Executes dropped EXE 1 IoCs
pid Process 4876 8107.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 82da066114537330ed9ec88079dfe890N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8107.tmp -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4876 8107.tmp -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings 8107.tmp -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4924 WINWORD.EXE 4924 WINWORD.EXE -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4876 8107.tmp -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 4924 WINWORD.EXE 4924 WINWORD.EXE 4924 WINWORD.EXE 4924 WINWORD.EXE 4924 WINWORD.EXE 4924 WINWORD.EXE 4924 WINWORD.EXE -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2804 wrote to memory of 4876 2804 82da066114537330ed9ec88079dfe890N.exe 83 PID 2804 wrote to memory of 4876 2804 82da066114537330ed9ec88079dfe890N.exe 83 PID 2804 wrote to memory of 4876 2804 82da066114537330ed9ec88079dfe890N.exe 83 PID 4876 wrote to memory of 4924 4876 8107.tmp 88 PID 4876 wrote to memory of 4924 4876 8107.tmp 88 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\82da066114537330ed9ec88079dfe890N.exe"C:\Users\Admin\AppData\Local\Temp\82da066114537330ed9ec88079dfe890N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\8107.tmp"C:\Users\Admin\AppData\Local\Temp\8107.tmp" --pingC:\Users\Admin\AppData\Local\Temp\82da066114537330ed9ec88079dfe890N.exe E3E36B42AAC67DF26B68D5494BF9ED2ED9F0C0D494C591F1664368E2CA5F0974F46F068633DA18EC70C817F4096F16F153CC83E016EAF6E4BD3381BF45C0B0C42⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Modifies registry class
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\82da066114537330ed9ec88079dfe890N.docx" /o ""3⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4924
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
874KB
MD5679d2608fdd6738f7146325bb93f055b
SHA18b53c7557221ac2855d31be32928febb01ede120
SHA2564646d5f86abcc945dd913295f9002d9c5ce2482272fff9cd1340211c7a3238d7
SHA51212ebd3de21a86796ecfccab25ab9d9923a0b8696897b6e53c0249d7eacf0d8787b7d253c7f69882940cf175a75cdc41eba0f40890d035adeaab0b42801641c47
-
Filesize
21KB
MD57079891932a64f097abafd233055a1e9
SHA1246d95feafe67689d49a5a4cadba18d3ac1914e5
SHA256c97189b50e5e92be09966d4732b6d61a2e435b2935d60c09989e555ae442e7a1
SHA5126e9ee6427d7cc2474dc634b088cf3f35d06dfb734d2b63fbbc794f4083b4b5754379daff4804bf5024b1b430aa5e50fa6d839d3473ceeed3043d373c85e9862a