Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    93s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/09/2024, 13:54

General

  • Target

    ecf24d1e9ea91661f99a8dcecc826b1d0c79f2a02cd1aee98d45669638658c5cN.exe

  • Size

    154KB

  • MD5

    bd099b79279d97ef33e3e2701d1c6c60

  • SHA1

    6e1ae7cb3be30f3cbdb2293e17d3305479af3755

  • SHA256

    ecf24d1e9ea91661f99a8dcecc826b1d0c79f2a02cd1aee98d45669638658c5c

  • SHA512

    0fe5ea10685553c2fa566b45cca652a9312154e583f30d7734746333d8e2527f8f73dacb75f5b0eb3ceb15cebfe3ee3ba318cbbd43379b4bdb4c9ff80b68d41b

  • SSDEEP

    3072:Ntbqvi9nMKxQbZ5x66EfACsxfcYvQd2OeS:Nt2vsx+AV4LfLOR

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ecf24d1e9ea91661f99a8dcecc826b1d0c79f2a02cd1aee98d45669638658c5cN.exe
    "C:\Users\Admin\AppData\Local\Temp\ecf24d1e9ea91661f99a8dcecc826b1d0c79f2a02cd1aee98d45669638658c5cN.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:944
    • C:\Users\Admin\AppData\Local\Temp\biudfw.exe
      "C:\Users\Admin\AppData\Local\Temp\biudfw.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4744
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4012

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\biudfw.exe

    Filesize

    154KB

    MD5

    0a0d25ec68a6ed4372531aa523c5a358

    SHA1

    3a818afbbfe2be02e1b3ea49227f022a6274f0cd

    SHA256

    0ed66967cf1ec6eda9e3f733c7ec8649fdc4d730228de1cfcfa303037a84dba1

    SHA512

    38eaee085d3d2fc6a97373312be189e80b6140e41d412bd4b05b2268718e6fa622bc7c5ebe408e23152a603aa29f458a23a262a6a69c3c6806d1bdf64f1b724e

  • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

    Filesize

    512B

    MD5

    2930c042c9ee5e07f321f2134a0c7edc

    SHA1

    ee39f41eaf6ce3c8d917a89e65959414ae0088e6

    SHA256

    a328475bbb730da292b83ed6cabbdbfc0616f042296f0c6fa356c5368ffc1309

    SHA512

    2da91d5effc116d8c8661c2a99f1d9c2aaffda0f776551dc7ad1911fdb2765591e5b441b9a1fe0090bcda8ed24d180b563ed2c127676cf1de40001e4b15b5506

  • C:\Users\Admin\AppData\Local\Temp\sanfdr.bat

    Filesize

    340B

    MD5

    faf327843e5f9fa9929675de5bf7174c

    SHA1

    08b3dd34478b8b28f375e8295b8a37a00417647d

    SHA256

    66f309b291522027f8c7307a35db25c042a2ab5adad2c7d1685a21ee92ffa1f6

    SHA512

    498b3ec88f48e02de8cfc93164c77c60d7b588a50a4f6f4e9d8e92aa0462cb12a2968747107d5eb5644fa8c58d92fcd6c7b41171dfa8010b4551ceadcb930776