Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
95s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/09/2024, 18:24
Behavioral task
behavioral1
Sample
7ddc96c0aaeda71d6d0d6b2b25fb5e40N.exe
Resource
win7-20240903-en
General
-
Target
7ddc96c0aaeda71d6d0d6b2b25fb5e40N.exe
-
Size
61KB
-
MD5
7ddc96c0aaeda71d6d0d6b2b25fb5e40
-
SHA1
c563c44db39e8adafec50fd340e3e7c6aa8fc843
-
SHA256
aefccb4b3298d621b8a36e343f040a7fd66e8b8c6d461e1a87743601372151c4
-
SHA512
ceb38b0f9bd059720fd92db03041a4b55ac32e5c6c5b7f1adc142636a86cd15a7418e97f7962231828af0b972cb9ab3b83f8e527f55588ff2516931945ad82b6
-
SSDEEP
768:r8eRH+MlFh0pDpuJ84WEi+U6sh7iQroCHmyf+RjFBSuB2XpfsPpzSdtKDGo:r9l+W8xFt6sh7iQroCoRB0u0sPpzS2V
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation 7ddc96c0aaeda71d6d0d6b2b25fb5e40N.exe -
Executes dropped EXE 1 IoCs
pid Process 1892 bkgrnd.exe -
resource yara_rule behavioral2/memory/1600-0-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral2/files/0x00090000000233da-7.dat upx behavioral2/memory/1600-11-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral2/memory/1892-19-0x0000000000400000-0x000000000040F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bkgrnd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7ddc96c0aaeda71d6d0d6b2b25fb5e40N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1600 wrote to memory of 1892 1600 7ddc96c0aaeda71d6d0d6b2b25fb5e40N.exe 85 PID 1600 wrote to memory of 1892 1600 7ddc96c0aaeda71d6d0d6b2b25fb5e40N.exe 85 PID 1600 wrote to memory of 1892 1600 7ddc96c0aaeda71d6d0d6b2b25fb5e40N.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\7ddc96c0aaeda71d6d0d6b2b25fb5e40N.exe"C:\Users\Admin\AppData\Local\Temp\7ddc96c0aaeda71d6d0d6b2b25fb5e40N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\bkgrnd.exe"C:\Users\Admin\AppData\Local\Temp\bkgrnd.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1892
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD51563ade11e1a67c4719f1611b5a37965
SHA1f1bcb3626baf37b76167e2b1a58f9615ca649810
SHA2563a22951d3e9321bea96ce243bc63268fce63ddca3e70304234e630e192817a5b
SHA512a812c88b24a6f2e74681a53df0d088a0f4b8113f7da73f558b5c9f253bae685c4bc9d10b34cbef16b3b6dccb9934aa709fe359cb4d656787be4fc1c60c71f5d4