Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    145s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/09/2024, 01:54

General

  • Target

    c3d15a76336bdb3d60139b78bab2ef22b0134583c2fcb9d64b514ad770704eeb.exe

  • Size

    26KB

  • MD5

    69f6036eeee211095f3b91e90d2ec8fb

  • SHA1

    b856bcf7b4c4dc5822192c581526b44dda9efa05

  • SHA256

    c3d15a76336bdb3d60139b78bab2ef22b0134583c2fcb9d64b514ad770704eeb

  • SHA512

    9a9a5fbb67091b0cfcbcb2453e554a91bf365cd4f851afd2faad30af7f92b9cfa267c111718d86e7702ead33bf2d774d0fc7071abb488e3eabcc65f2fbed2f36

  • SSDEEP

    384:F3EqGY2HXgrS40Lol5ZLzH4VhvshYpATUgch1A9NB/erxUk8t2GY:F3EqG5H8PuoljH4vEhkgs1lxoY

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c3d15a76336bdb3d60139b78bab2ef22b0134583c2fcb9d64b514ad770704eeb.exe
    "C:\Users\Admin\AppData\Local\Temp\c3d15a76336bdb3d60139b78bab2ef22b0134583c2fcb9d64b514ad770704eeb.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:224
    • C:\Users\Admin\AppData\Local\Temp\winupdate.exe
      "C:\Users\Admin\AppData\Local\Temp\winupdate.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1984

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\winupdate.exe

    Filesize

    26KB

    MD5

    d91a9d88099cd741778f82354cdb0fe9

    SHA1

    eca86c2b051e766c7a3f20516cde77688ca00e4a

    SHA256

    437b16977ba2b28177a51c2125996f21dcd44cd7abeab3bb135d80eb2f9f3ab1

    SHA512

    777f3178b2e79fbb74302494fe18a92fbfa781dc1f16243581a4b71f28091de017172b2ad566a3b4a34eb362fea13bcd69a87f2cb25a9afcdfa8eb43705445b3

  • memory/224-0-0x0000000000500000-0x0000000000511000-memory.dmp

    Filesize

    68KB

  • memory/224-1-0x000000000050D000-0x000000000050E000-memory.dmp

    Filesize

    4KB

  • memory/224-2-0x0000000000500000-0x0000000000511000-memory.dmp

    Filesize

    68KB

  • memory/1984-12-0x0000000000500000-0x0000000000511000-memory.dmp

    Filesize

    68KB

  • memory/1984-13-0x0000000000500000-0x0000000000511000-memory.dmp

    Filesize

    68KB