Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    94s
  • max time network
    112s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2024, 06:19

General

  • Target

    343a25e0cfa4535e6026eb633c649f0997e6a1628aa09a8cb19c2062805965fbN.exe

  • Size

    74KB

  • MD5

    502bc275898d6d0180cfa623a3fbb090

  • SHA1

    99b2616fba999d9176495be12845840df6e80cd9

  • SHA256

    343a25e0cfa4535e6026eb633c649f0997e6a1628aa09a8cb19c2062805965fb

  • SHA512

    f50b58253f2822dacb3a46bd6f50d5b24bf1cba0bd12e39fdb8ed002244bed4e2a03b7cba92401efbf6be8719251589e629ac9ee556449443f87ea12728d2e9c

  • SSDEEP

    768:dDwRAnRAGeiDTK4jDmJI5hwXfytKphH8p2R9WtIhcl:dsK1eiisDmi5FtKhcg9W0cl

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\343a25e0cfa4535e6026eb633c649f0997e6a1628aa09a8cb19c2062805965fbN.exe
    "C:\Users\Admin\AppData\Local\Temp\343a25e0cfa4535e6026eb633c649f0997e6a1628aa09a8cb19c2062805965fbN.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1524
    • C:\Users\Admin\AppData\Local\Temp\hummy.exe
      "C:\Users\Admin\AppData\Local\Temp\hummy.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1576

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hummy.exe

    Filesize

    74KB

    MD5

    4cabfb2d3e740d513fee271893d3496e

    SHA1

    2cba7d3ddcf304b5d01b05bcc5ec222917d7f611

    SHA256

    8753961de85332d1999f4e1083909fbcdceb8e8930068006ae3ae4d8282c3b11

    SHA512

    93143b71b7a364cefde856be0d2278f4fb77022ca2cfd22669c45693c2de048cada88521b73ca156d5c68457199f80031b6af4d486b5c755a3a06adc9a31d161