Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/09/2024, 13:54
Behavioral task
behavioral1
Sample
ecf24d1e9ea91661f99a8dcecc826b1d0c79f2a02cd1aee98d45669638658c5cN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ecf24d1e9ea91661f99a8dcecc826b1d0c79f2a02cd1aee98d45669638658c5cN.exe
Resource
win10v2004-20240802-en
General
-
Target
ecf24d1e9ea91661f99a8dcecc826b1d0c79f2a02cd1aee98d45669638658c5cN.exe
-
Size
154KB
-
MD5
bd099b79279d97ef33e3e2701d1c6c60
-
SHA1
6e1ae7cb3be30f3cbdb2293e17d3305479af3755
-
SHA256
ecf24d1e9ea91661f99a8dcecc826b1d0c79f2a02cd1aee98d45669638658c5c
-
SHA512
0fe5ea10685553c2fa566b45cca652a9312154e583f30d7734746333d8e2527f8f73dacb75f5b0eb3ceb15cebfe3ee3ba318cbbd43379b4bdb4c9ff80b68d41b
-
SSDEEP
3072:Ntbqvi9nMKxQbZ5x66EfACsxfcYvQd2OeS:Nt2vsx+AV4LfLOR
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation ecf24d1e9ea91661f99a8dcecc826b1d0c79f2a02cd1aee98d45669638658c5cN.exe -
Executes dropped EXE 1 IoCs
pid Process 4744 biudfw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ecf24d1e9ea91661f99a8dcecc826b1d0c79f2a02cd1aee98d45669638658c5cN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language biudfw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 944 wrote to memory of 4744 944 ecf24d1e9ea91661f99a8dcecc826b1d0c79f2a02cd1aee98d45669638658c5cN.exe 84 PID 944 wrote to memory of 4744 944 ecf24d1e9ea91661f99a8dcecc826b1d0c79f2a02cd1aee98d45669638658c5cN.exe 84 PID 944 wrote to memory of 4744 944 ecf24d1e9ea91661f99a8dcecc826b1d0c79f2a02cd1aee98d45669638658c5cN.exe 84 PID 944 wrote to memory of 4012 944 ecf24d1e9ea91661f99a8dcecc826b1d0c79f2a02cd1aee98d45669638658c5cN.exe 85 PID 944 wrote to memory of 4012 944 ecf24d1e9ea91661f99a8dcecc826b1d0c79f2a02cd1aee98d45669638658c5cN.exe 85 PID 944 wrote to memory of 4012 944 ecf24d1e9ea91661f99a8dcecc826b1d0c79f2a02cd1aee98d45669638658c5cN.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\ecf24d1e9ea91661f99a8dcecc826b1d0c79f2a02cd1aee98d45669638658c5cN.exe"C:\Users\Admin\AppData\Local\Temp\ecf24d1e9ea91661f99a8dcecc826b1d0c79f2a02cd1aee98d45669638658c5cN.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Users\Admin\AppData\Local\Temp\biudfw.exe"C:\Users\Admin\AppData\Local\Temp\biudfw.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4744
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:4012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
154KB
MD50a0d25ec68a6ed4372531aa523c5a358
SHA13a818afbbfe2be02e1b3ea49227f022a6274f0cd
SHA2560ed66967cf1ec6eda9e3f733c7ec8649fdc4d730228de1cfcfa303037a84dba1
SHA51238eaee085d3d2fc6a97373312be189e80b6140e41d412bd4b05b2268718e6fa622bc7c5ebe408e23152a603aa29f458a23a262a6a69c3c6806d1bdf64f1b724e
-
Filesize
512B
MD52930c042c9ee5e07f321f2134a0c7edc
SHA1ee39f41eaf6ce3c8d917a89e65959414ae0088e6
SHA256a328475bbb730da292b83ed6cabbdbfc0616f042296f0c6fa356c5368ffc1309
SHA5122da91d5effc116d8c8661c2a99f1d9c2aaffda0f776551dc7ad1911fdb2765591e5b441b9a1fe0090bcda8ed24d180b563ed2c127676cf1de40001e4b15b5506
-
Filesize
340B
MD5faf327843e5f9fa9929675de5bf7174c
SHA108b3dd34478b8b28f375e8295b8a37a00417647d
SHA25666f309b291522027f8c7307a35db25c042a2ab5adad2c7d1685a21ee92ffa1f6
SHA512498b3ec88f48e02de8cfc93164c77c60d7b588a50a4f6f4e9d8e92aa0462cb12a2968747107d5eb5644fa8c58d92fcd6c7b41171dfa8010b4551ceadcb930776