Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/09/2024, 16:58
Static task
static1
Behavioral task
behavioral1
Sample
84d93cabe929e72fcfdbb69ee45b40a3c665126e4b74e9b538414c55a173a7fcN.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
84d93cabe929e72fcfdbb69ee45b40a3c665126e4b74e9b538414c55a173a7fcN.exe
Resource
win10v2004-20240802-en
General
-
Target
84d93cabe929e72fcfdbb69ee45b40a3c665126e4b74e9b538414c55a173a7fcN.exe
-
Size
51KB
-
MD5
d559829f41987a74b5f296332163d630
-
SHA1
e89ed54e458bb5d513ae9616d4a21f804b9a5eb4
-
SHA256
84d93cabe929e72fcfdbb69ee45b40a3c665126e4b74e9b538414c55a173a7fc
-
SHA512
2b2398a2f4624817f26a0785c7170e53acb9ba67fd43504c373c6323caa40ebac8ce7bc507413dc43d586323f1f7db6ac996064a0d8a58faebfef3eee78fdfb6
-
SSDEEP
768:l2EMQWlqBxRlHzZN2zJo3LeivGnCoPToFr1tptjFhav:0lqBxRlHzZN2zSPvDoPTojtptjzi
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation 84d93cabe929e72fcfdbb69ee45b40a3c665126e4b74e9b538414c55a173a7fcN.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation laccm.exe -
Executes dropped EXE 1 IoCs
pid Process 4360 laccm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 84d93cabe929e72fcfdbb69ee45b40a3c665126e4b74e9b538414c55a173a7fcN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language laccm.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4500 wrote to memory of 4360 4500 84d93cabe929e72fcfdbb69ee45b40a3c665126e4b74e9b538414c55a173a7fcN.exe 82 PID 4500 wrote to memory of 4360 4500 84d93cabe929e72fcfdbb69ee45b40a3c665126e4b74e9b538414c55a173a7fcN.exe 82 PID 4500 wrote to memory of 4360 4500 84d93cabe929e72fcfdbb69ee45b40a3c665126e4b74e9b538414c55a173a7fcN.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\84d93cabe929e72fcfdbb69ee45b40a3c665126e4b74e9b538414c55a173a7fcN.exe"C:\Users\Admin\AppData\Local\Temp\84d93cabe929e72fcfdbb69ee45b40a3c665126e4b74e9b538414c55a173a7fcN.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Users\Admin\AppData\Local\Temp\laccm.exe"C:\Users\Admin\AppData\Local\Temp\laccm.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4360
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
58KB
MD5abb385bbf00b3a3ed0b9b00c000fd436
SHA1fc009b7eb8ae6ab0665e392c83c22a7eee693b49
SHA25645a3846476d3ffb7de3f9fb6a5b49f26696a843a41ecbc39960a3a5dbf70561f
SHA5129cbc0abbe733f14f5576c0a5f6c6246a5c7194b190eabfa4b9d2cf29f472daddb6ceeddde9d78ae5697c5756f77503c2a32f5fa620cd506a69f8a834b4da824f
-
Filesize
51KB
MD511190e724f2ec337cf0388a316f715fd
SHA127ea1ee7b42608ebb28d539b96d28ac6fb5f26a2
SHA256a166330f44540cca5a8a4fb3f04b0ee814506bb37a9a7b178e140879586a63e3
SHA5124a29fdce7231d506751c5b49e5e18eb225174cc74883d6c3904006823381770e4f0f849667ddfff1c628828ce51976860fbc19424519ccbea53a3bd10cb7ec2f