Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/09/2024, 03:58
Static task
static1
Behavioral task
behavioral1
Sample
c9e9653dae205fb53b38e60e86e27140N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c9e9653dae205fb53b38e60e86e27140N.exe
Resource
win10v2004-20240802-en
General
-
Target
c9e9653dae205fb53b38e60e86e27140N.exe
-
Size
41KB
-
MD5
c9e9653dae205fb53b38e60e86e27140
-
SHA1
353970b1150cc1065b601de97ae32b28c84fd88c
-
SHA256
62a34afd2d6dc2f8702dca307c31f6e5047ce59b17d70125f903d1b477c93ad3
-
SHA512
4ad4b11bf347c874cc1d43625d1cc5699e758dbd91547e426933fa66bcde6061cd9fe26912f31c692898468baa1ec0956dea21dd7e3ee1166bb6c841405df50d
-
SSDEEP
384:9JBcQ3oQ/jeO6Rj2cKfbKyVRGqJ06MEXnHf4HCeAxYXWE/Z7mbJbt:BcqoGjeO6RjnyzohU/4HlAxzkYbJB
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation c9e9653dae205fb53b38e60e86e27140N.exe -
Executes dropped EXE 1 IoCs
pid Process 1260 herewin.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c9e9653dae205fb53b38e60e86e27140N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language herewin.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4180 wrote to memory of 1260 4180 c9e9653dae205fb53b38e60e86e27140N.exe 84 PID 4180 wrote to memory of 1260 4180 c9e9653dae205fb53b38e60e86e27140N.exe 84 PID 4180 wrote to memory of 1260 4180 c9e9653dae205fb53b38e60e86e27140N.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\c9e9653dae205fb53b38e60e86e27140N.exe"C:\Users\Admin\AppData\Local\Temp\c9e9653dae205fb53b38e60e86e27140N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Users\Admin\AppData\Local\Temp\herewin.exe"C:\Users\Admin\AppData\Local\Temp\herewin.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1260
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD54d003bdff4ebc9eb3237642cc8e1e88e
SHA15ba59e9f73df1326d2f1764284f0ccb1a0340ff9
SHA256f2f62f4e126c93a2a5d27fd0eeb4ce657d037974da751daf615c8c9e5ac0f66d
SHA512ee1138e171fed7a6f7b0592a751aaa7ca2271be1995a4880794860b7d4872f51199b90c2c9247ec219a8fbf5aca9a315a4e9676d365e0645a7ccb24cde5181fc