Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    93s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/09/2024, 16:55

General

  • Target

    Andromeda‌‌‌ BY @STRANGEMALWARE.exe

  • Size

    11.7MB

  • MD5

    2d74c0773274a5a26452a58597b71dae

  • SHA1

    eb55c987262efad46d4ee1368c947d82defcb0b5

  • SHA256

    151869c507cc328addc531df01b4b659d929df630e719267d2f52397a4d914c0

  • SHA512

    0c0758fe0667bc62bbb09e8a34345cd4605e1c9e938c7aeb6e92583fd4616bf092898ce41e61184d5f8d055e6eede42e6803be21a4e1b077462d0d4c4339f4ba

  • SSDEEP

    196608:WzIuGN2e2/PEIr9dpoKjT+uwVkSWO2t0c+gWzs634rS0gQfx+vD7clrfj1Y:WFA2JnjrpoKjTB+HWORcxWQVrSkAgl/

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Andromeda‌‌‌ BY @STRANGEMALWARE.exe
    "C:\Users\Admin\AppData\Local\Temp\Andromeda‌‌‌ BY @STRANGEMALWARE.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4188
    • C:\Users\Admin\AppData\Local\Temp\Andromeda.exe
      "C:\Users\Admin\AppData\Local\Temp\Andromeda.exe"
      2⤵
      • Executes dropped EXE
      PID:2396

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Andromeda.exe

    Filesize

    17.0MB

    MD5

    d19bf0e88eee53cd54800477fbe91963

    SHA1

    3f701c190c220d804eb5c7cbd39e74c3100c5774

    SHA256

    70bfdbe3723e37ba0797e936a5d8c17ff3df7da64a4a84e6ac2f5270c37db2db

    SHA512

    87975d5a36504a356fdb04f4bb8fe7e78344e886ca68de1c482a2d6424976fba60418d6e0457b5ca6efa7c4788d583a1f4f365152f70260946a39a6319ea2f2c

  • memory/2396-17-0x00007FF958F00000-0x00007FF9599C1000-memory.dmp

    Filesize

    10.8MB

  • memory/2396-18-0x000002D5BD840000-0x000002D5BE938000-memory.dmp

    Filesize

    17.0MB

  • memory/2396-19-0x00007FF958F00000-0x00007FF9599C1000-memory.dmp

    Filesize

    10.8MB

  • memory/2396-20-0x00007FF958F00000-0x00007FF9599C1000-memory.dmp

    Filesize

    10.8MB

  • memory/4188-0-0x00007FF958F03000-0x00007FF958F05000-memory.dmp

    Filesize

    8KB

  • memory/4188-1-0x0000000000C20000-0x00000000017E2000-memory.dmp

    Filesize

    11.8MB

  • memory/4188-2-0x00007FF958F00000-0x00007FF9599C1000-memory.dmp

    Filesize

    10.8MB

  • memory/4188-16-0x00007FF958F00000-0x00007FF9599C1000-memory.dmp

    Filesize

    10.8MB