Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/09/2024, 02:04
Static task
static1
Behavioral task
behavioral1
Sample
fb1a6ccea5888ad4acd8465efe8555bce2883c24a3b92bab189f079b82a9df3a.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fb1a6ccea5888ad4acd8465efe8555bce2883c24a3b92bab189f079b82a9df3a.exe
Resource
win10v2004-20240802-en
General
-
Target
fb1a6ccea5888ad4acd8465efe8555bce2883c24a3b92bab189f079b82a9df3a.exe
-
Size
16.6MB
-
MD5
a4ee3ed90cfe37b966eea81519abfea5
-
SHA1
95931de0aa6d96568acebc11e551e8e1305bf003
-
SHA256
fb1a6ccea5888ad4acd8465efe8555bce2883c24a3b92bab189f079b82a9df3a
-
SHA512
ca3686c8ed2808d046d8247df110aa3c72266aeb7ffb65a82187c0d9cfe6c72b1c0ca1b20d830876067e64bfee8dae38abd53a3a6a9cd493138b1a43379f121c
-
SSDEEP
393216:EWZZAS/MwIOGiSZFAqOTYGDTCSq//svd:EYZP/MwIS5m//
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation fb1a6ccea5888ad4acd8465efe8555bce2883c24a3b92bab189f079b82a9df3a.exe -
Executes dropped EXE 2 IoCs
pid Process 1084 svcss.exe 4956 svcss.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fb1a6ccea5888ad4acd8465efe8555bce2883c24a3b92bab189f079b82a9df3a.exe -
Runs net.exe
-
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2464 wrote to memory of 1084 2464 fb1a6ccea5888ad4acd8465efe8555bce2883c24a3b92bab189f079b82a9df3a.exe 86 PID 2464 wrote to memory of 1084 2464 fb1a6ccea5888ad4acd8465efe8555bce2883c24a3b92bab189f079b82a9df3a.exe 86 PID 4956 wrote to memory of 2924 4956 svcss.exe 88 PID 4956 wrote to memory of 2924 4956 svcss.exe 88 PID 2924 wrote to memory of 744 2924 cmd.exe 90 PID 2924 wrote to memory of 744 2924 cmd.exe 90 PID 5092 wrote to memory of 3604 5092 cmd.exe 102 PID 5092 wrote to memory of 3604 5092 cmd.exe 102 PID 3604 wrote to memory of 2364 3604 net.exe 103 PID 3604 wrote to memory of 2364 3604 net.exe 103 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb1a6ccea5888ad4acd8465efe8555bce2883c24a3b92bab189f079b82a9df3a.exe"C:\Users\Admin\AppData\Local\Temp\fb1a6ccea5888ad4acd8465efe8555bce2883c24a3b92bab189f079b82a9df3a.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\ProgramData\MicrosoftSMM\svcss.exe"C:\ProgramData\MicrosoftSMM\svcss.exe" /install2⤵
- Executes dropped EXE
PID:1084
-
-
C:\ProgramData\MicrosoftSMM\svcss.exeC:\ProgramData\MicrosoftSMM\svcss.exe /startedbyscm:00D244E7-B5119CE0-UpdateStorServ1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Windows\system32\cmd.execmd.exe /C schtasks /query /TN "Monitor Service"2⤵
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\system32\schtasks.exeschtasks /query /TN "Monitor Service"3⤵PID:744
-
-
-
C:\Windows\system32\cmd.execmd.exe /c net start "UpdateStorServ"1⤵
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Windows\system32\net.exenet start "UpdateStorServ"2⤵
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start "UpdateStorServ"3⤵PID:2364
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13.3MB
MD5b66b904185a9e881b77fcbcca7bcb125
SHA14b07391434332e4f8faadf61f288e48389bcea08
SHA2563c0be13be97c2b7ac3737997bb56f604a947b4d404456f644b2af4be4f9c17d2
SHA51203d05f0bd94c0d1956be4949aa29a99bc0f1f8a3812d90fc4be3338cb596056bb3d37e865b3d29e8107ab945e79f3068ae4d85189927d8544855acaee9e3db59