Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
125s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22/09/2024, 05:03
Behavioral task
behavioral1
Sample
89c0efa7f36fafadb1f96dbbb414632521f4e3270f889d780928b36f3d8d52ce.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
89c0efa7f36fafadb1f96dbbb414632521f4e3270f889d780928b36f3d8d52ce.exe
Resource
win10v2004-20240802-en
General
-
Target
89c0efa7f36fafadb1f96dbbb414632521f4e3270f889d780928b36f3d8d52ce.exe
-
Size
483KB
-
MD5
c80e7a64589dc19b6cbe79d371df5247
-
SHA1
41e8427fe153726b7c74f93a7e5aa0f4268ef25d
-
SHA256
89c0efa7f36fafadb1f96dbbb414632521f4e3270f889d780928b36f3d8d52ce
-
SHA512
5575ce6ecce06dff1da09ce8dc7b39e4e945582992e441bad9fbab66bbd0114065af0c7a930e17ef0ad7125c0b6112aaaa4d10c763153bff7078dd3a2fd20cc6
-
SSDEEP
6144:ZTz+c6KHYBhDc1RGJdv//NkUn+N5Bkf/0TELRvIZPjbsAOZZmAX4cr3T4:ZTlrYw1RUh3NFn+N5WfIQIjbs/ZmcT4
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation 89c0efa7f36fafadb1f96dbbb414632521f4e3270f889d780928b36f3d8d52ce.exe -
Deletes itself 1 IoCs
pid Process 1156 WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 89c0efa7f36fafadb1f96dbbb414632521f4e3270f889d780928b36f3d8d52ce.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings 89c0efa7f36fafadb1f96dbbb414632521f4e3270f889d780928b36f3d8d52ce.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3056 89c0efa7f36fafadb1f96dbbb414632521f4e3270f889d780928b36f3d8d52ce.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3056 wrote to memory of 1156 3056 89c0efa7f36fafadb1f96dbbb414632521f4e3270f889d780928b36f3d8d52ce.exe 91 PID 3056 wrote to memory of 1156 3056 89c0efa7f36fafadb1f96dbbb414632521f4e3270f889d780928b36f3d8d52ce.exe 91 PID 3056 wrote to memory of 1156 3056 89c0efa7f36fafadb1f96dbbb414632521f4e3270f889d780928b36f3d8d52ce.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\89c0efa7f36fafadb1f96dbbb414632521f4e3270f889d780928b36f3d8d52ce.exe"C:\Users\Admin\AppData\Local\Temp\89c0efa7f36fafadb1f96dbbb414632521f4e3270f889d780928b36f3d8d52ce.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\hmxcoarfffxemdvdonqox.vbs"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1156
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD503ac9b2068b3850b8f43e357b9f7ca61
SHA1ee0e1c66d2b7dcb2f501cb4a577b59236d854af2
SHA25626a9c6cf7def9deb1f28e85249f43ab0353eca910a51ebc3add863f8d0803861
SHA512e947cfe42f5f94cb97774883a1f6834db1da0210e5a345ff511cd59fa5b9f7ff0e6b8946cd12c9b75c2c5214ba7cd1c9aa70fb91d15329cb541c85ca89b30f9c
-
Filesize
728B
MD51e7384c699d4922714e71c2f4b175626
SHA13dedf3a1f2f8754682038297dd3e61ec6757d1a0
SHA2565f1c0f796c8528b8ba90919763efaed8cb7e19692ea5def61d450582ceb32250
SHA5121bd16e784694309926108f2c875e1467f847f890b556a4ad7cb07c7f1871b3c02abb2b2f60e263ca6b4e60c46ff31d259937a47df48e4a7f7d679cba68edaf89