Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    112s
  • max time network
    99s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2024, 01:19

General

  • Target

    95602e66605d74f8ae3ee3cd62080c11f02e450df1eaa13a450781ad0345875bN.exe

  • Size

    203KB

  • MD5

    e1bfd78da29f35c6343a579c1e8238a0

  • SHA1

    708e572928f695741c7a4d8b7e9ebe4f35ed641e

  • SHA256

    95602e66605d74f8ae3ee3cd62080c11f02e450df1eaa13a450781ad0345875b

  • SHA512

    bbeb0f307c1405caf13f018b4f0f48a3547749f19a5069f14cca956d44eec2a187a5792b666f5158d3423af2bb8138fbe77f776d7763a0a21c59514e4bb81016

  • SSDEEP

    3072:nchlUq90BGgKt/14Id5lM2kpHtDCJrqxRCNsOoBSlN/625ML71B:n6lUVBGgK91BWBlCZqxRkVoWNW7H

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\95602e66605d74f8ae3ee3cd62080c11f02e450df1eaa13a450781ad0345875bN.exe
    "C:\Users\Admin\AppData\Local\Temp\95602e66605d74f8ae3ee3cd62080c11f02e450df1eaa13a450781ad0345875bN.exe"
    1⤵
    • Drops file in Drivers directory
    • Checks computer location settings
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4244
    • C:\Users\Admin\AppData\Local\dplaysvr.exe
      "C:\Users\Admin\AppData\Local\dplaysvr.exe" C:\Users\Admin\AppData\Local\Temp\95602e66605d74f8ae3ee3cd62080c11f02e450df1eaa13a450781ad0345875bN.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:4204
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}
    1⤵
    • System Location Discovery: System Language Discovery
    PID:3192

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\75AD.tmp

    Filesize

    85KB

    MD5

    1176aa8559f6b635d2e1e8090ac97e68

    SHA1

    78ef7204fafedfade2d0d7f5785c782ae4089b07

    SHA256

    04bd8000d103535516d8a5ef4a25b78918a2ed47ae5ed297b221995f6e7d468f

    SHA512

    90a252b15ad5c8657100d510366df1a09bc1516ceea809e89237a9e3e1507895e565771b732ffcd1565d07b300f85df39069558231f1cc8f849753ca958e7958

  • C:\Users\Admin\AppData\Local\Temp\75AE.tmp

    Filesize

    48KB

    MD5

    15cccfc50819f1c15b590569d919e206

    SHA1

    611a5962fc12034b5bf6456b9916382ef96f51c2

    SHA256

    663eee4846c459f4808389bf54ce167d4da74359d6bb96e00224528e4004603d

    SHA512

    f93efbe0e9421ef4c222382f77d17f005b0010e42a34b36faecc5e6ca6512fcdd042a7fc27db1170507a6407504f9629a958e878e3ccb1d6d8c8782e5bffb4b9

  • C:\Users\Admin\AppData\Local\Temp\75B0.tmp

    Filesize

    882B

    MD5

    880a9b59be7eb9290f75b66616f0e7c0

    SHA1

    8672d534caa872b06c32d887f43f1a1bcec9d1cb

    SHA256

    c049598c599d3c6a27a192d30ac62d4740069902c8d1c3f49283e9ed6ffa3df0

    SHA512

    e0ee61d24df010bb41bfc3ee6c1032fe858addbea52f0e48b1a536025cb818fc28c14f2da0249315095f9357731333c7ce4f8abf9cbbc2279a0290c0f79ac03a

  • memory/4204-23-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB

  • memory/4204-21-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB

  • memory/4204-20-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB

  • memory/4204-25-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB

  • memory/4204-26-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB

  • memory/4204-31-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB

  • memory/4204-28-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB

  • memory/4204-32-0x00000000006E0000-0x00000000006EF000-memory.dmp

    Filesize

    60KB

  • memory/4204-33-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB

  • memory/4244-1-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/4244-22-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/4244-0-0x0000000002200000-0x0000000002236000-memory.dmp

    Filesize

    216KB

  • memory/4244-38-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB