Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
97s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/09/2024, 19:52
Static task
static1
Behavioral task
behavioral1
Sample
c266a80102b18214213c40df8ae1a590N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c266a80102b18214213c40df8ae1a590N.exe
Resource
win10v2004-20240802-en
General
-
Target
c266a80102b18214213c40df8ae1a590N.exe
-
Size
213KB
-
MD5
c266a80102b18214213c40df8ae1a590
-
SHA1
22e116c56d8003cc76ebc20c9c6208ddc39d4c2b
-
SHA256
394815d29801462e7c64bcd3eae9aa337e44f8153e1128964132e1bf7c2e8461
-
SHA512
1517295e31eb032f0300d4b2282d55999c5e2d287b66ce857ccb7c49481a9df7e9e93314434df50573e03df07ba943527777679ee5ecafb5a1bb217028fcecb0
-
SSDEEP
1536:P5AiTLOQ74YDtnlN5UL09atT0mBBAragjSvIYFwAmd/oHQpNulP:P53mQ7JtnP5I09qgmBBAWgjSvwN/oHWm
Malware Config
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
onthelinux - Password:
741852abc
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation c266a80102b18214213c40df8ae1a590N.exe -
Executes dropped EXE 1 IoCs
pid Process 3284 jusched.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\7d57eb5c\jusched.exe c266a80102b18214213c40df8ae1a590N.exe File created C:\Program Files (x86)\7d57eb5c\7d57eb5c c266a80102b18214213c40df8ae1a590N.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\Update23.job c266a80102b18214213c40df8ae1a590N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jusched.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c266a80102b18214213c40df8ae1a590N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4880 wrote to memory of 3284 4880 c266a80102b18214213c40df8ae1a590N.exe 91 PID 4880 wrote to memory of 3284 4880 c266a80102b18214213c40df8ae1a590N.exe 91 PID 4880 wrote to memory of 3284 4880 c266a80102b18214213c40df8ae1a590N.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\c266a80102b18214213c40df8ae1a590N.exe"C:\Users\Admin\AppData\Local\Temp\c266a80102b18214213c40df8ae1a590N.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Program Files (x86)\7d57eb5c\jusched.exe"C:\Program Files (x86)\7d57eb5c\jusched.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3284
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17B
MD54d77d6b250ffb567743b8dbcdad695b8
SHA1d5a8f98f9433f6d36c74df463cef3e2cf524462d
SHA2567ec7a3a23890c3592f5b762aecf11adbf8831fad11b8048aedfa7315d599c5f2
SHA5125655153049101fd67125d484c81f1ad30b44f36f00e3aabfe8d730a21661f4b394357b60da549289def4311b4cc7bd508d8fd6b8db254cd442b2152f8902bd71
-
Filesize
213KB
MD5de8a6181fa7ed0e41408ea30f3e494c2
SHA1b8f0cced68ad999e8ca2aeb4925159c55d90ae5d
SHA2569d0438fe735cc2e14a4498fbe53b0bf95b64c8c3b53a48b8d43db77c2d5228af
SHA512b19125fcf8754b86e381fc11eca1c4debdc091fe6bc7fe50bd1f7f11b001045c5ee3ff293a147c68fb4048df1051968c0ace4f0b2a102c6a07920bad68e056d6