Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    111s
  • max time network
    115s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/09/2024, 07:45

General

  • Target

    04ba8792f41973e5003aeb41aeb0ad8d93d5487a493929c99c3be6fecdb955e7N.exe

  • Size

    1.3MB

  • MD5

    558a94947a999e841e9be9fe91e0a5e0

  • SHA1

    f1b51f088629412207359a41428fd3af0346b199

  • SHA256

    04ba8792f41973e5003aeb41aeb0ad8d93d5487a493929c99c3be6fecdb955e7

  • SHA512

    003e3361417e4e8417d1f57aacbaade7adba8157ef938bda51af3f0fa7b7de0f3dc85696f7c796049ea7fb115382160490c2c356f49aa81b67e01c1a5a34f7d4

  • SSDEEP

    24576:0NjXZ5ZFw+JZjnEUdoZ5Rbh0FVG8WJLDTGMekF:0RZ5c+7jnr2ZbyFw8qLDTAkF

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 30 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\04ba8792f41973e5003aeb41aeb0ad8d93d5487a493929c99c3be6fecdb955e7N.exe
    "C:\Users\Admin\AppData\Local\Temp\04ba8792f41973e5003aeb41aeb0ad8d93d5487a493929c99c3be6fecdb955e7N.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3200
    • C:\Users\Admin\AppData\Roaming\Microsoft\DVX\dwm32.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\DVX\dwm32.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\DVX\dwm32.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3956
      • C:\Users\Admin\AppData\Roaming\Microsoft\DVX\dwm32.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\DVX\dwm32.exe"
        3⤵
        • Executes dropped EXE
        PID:4580
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x4ac 0x44c
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2336

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\DVX\dwm32.exe

    Filesize

    1.3MB

    MD5

    e8ce5bea74b17d9d6f9a4b00f1376604

    SHA1

    06498b0513b6f69140614ec760a07e92f7c4d4f2

    SHA256

    9d0e703c52e141d4f5e6571f80231f8ff144b90049d70c75698ef8b996d492ce

    SHA512

    945d67d54dfa748b0c6eae61ab5cce3af956eaca79e7c31818706018a1762a3a9af1e1ff8802371187821ba7713432fb1d1a75801a30785624f1b4bcc1441d45

  • memory/3200-54-0x0000000000400000-0x0000000000551000-memory.dmp

    Filesize

    1.3MB

  • memory/3956-61-0x0000000000400000-0x0000000000551000-memory.dmp

    Filesize

    1.3MB

  • memory/4580-55-0x0000000000400000-0x0000000000551000-memory.dmp

    Filesize

    1.3MB