Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01/10/2024, 07:48
Behavioral task
behavioral1
Sample
c4b92f45b28fe30ca4c9d637b78ec878852ba4c8036312591446149ef0c3fefaN.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c4b92f45b28fe30ca4c9d637b78ec878852ba4c8036312591446149ef0c3fefaN.exe
Resource
win10v2004-20240802-en
General
-
Target
c4b92f45b28fe30ca4c9d637b78ec878852ba4c8036312591446149ef0c3fefaN.exe
-
Size
260KB
-
MD5
cae51f7214ea8290c72288d86693b160
-
SHA1
e32478386fbb7d2307d3f7df9f18d842db70f5a3
-
SHA256
c4b92f45b28fe30ca4c9d637b78ec878852ba4c8036312591446149ef0c3fefa
-
SHA512
7bb34ed2887a941c6b47591d4d5fbbb55cd43bf308b16b60e25f9ac4cfbd8ca25c9e7c9bf31e8dc41629787e0dfb86f4db77aa0bac4d6eaa465961508664ee4a
-
SSDEEP
1536:GxtnE6acoso8vzxoSBUES5SwziMYiHzhtAia5QrMsQtCnt8qiJPQsZSTorlN33nn:K/vFYi9yQct1iJPQSrl1LtYFroxTSfY
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation c4b92f45b28fe30ca4c9d637b78ec878852ba4c8036312591446149ef0c3fefaN.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation 9dad8.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation 4e0c3.exe -
Executes dropped EXE 3 IoCs
pid Process 5064 9dad8.exe 2268 4e0c3.exe 4276 4e0c3.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "9dad8.exe" 9dad8.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\9dad8.exe c4b92f45b28fe30ca4c9d637b78ec878852ba4c8036312591446149ef0c3fefaN.exe File opened for modification C:\Windows\SysWOW64\9dad8.exe c4b92f45b28fe30ca4c9d637b78ec878852ba4c8036312591446149ef0c3fefaN.exe File opened for modification C:\Windows\SysWOW64\ 9dad8.exe File created C:\Windows\SysWOW64\4e0c3.exe 9dad8.exe File opened for modification C:\Windows\SysWOW64\4e0c3.exe 9dad8.exe File opened for modification C:\Windows\SysWOW64\4e0c3.exe 4e0c3.exe -
resource yara_rule behavioral2/memory/2624-0-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/files/0x0007000000023437-7.dat upx behavioral2/memory/2624-39-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/memory/2268-74-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/memory/5064-76-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/memory/2268-79-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral2/memory/4276-82-0x0000000000400000-0x0000000000442000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4e0c3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4e0c3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c4b92f45b28fe30ca4c9d637b78ec878852ba4c8036312591446149ef0c3fefaN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9dad8.exe -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings 4e0c3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 4e0c3.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings c4b92f45b28fe30ca4c9d637b78ec878852ba4c8036312591446149ef0c3fefaN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ c4b92f45b28fe30ca4c9d637b78ec878852ba4c8036312591446149ef0c3fefaN.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings 9dad8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 9dad8.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5064 9dad8.exe 5064 9dad8.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2624 c4b92f45b28fe30ca4c9d637b78ec878852ba4c8036312591446149ef0c3fefaN.exe 5064 9dad8.exe 2268 4e0c3.exe 4276 4e0c3.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2624 wrote to memory of 5064 2624 c4b92f45b28fe30ca4c9d637b78ec878852ba4c8036312591446149ef0c3fefaN.exe 82 PID 2624 wrote to memory of 5064 2624 c4b92f45b28fe30ca4c9d637b78ec878852ba4c8036312591446149ef0c3fefaN.exe 82 PID 2624 wrote to memory of 5064 2624 c4b92f45b28fe30ca4c9d637b78ec878852ba4c8036312591446149ef0c3fefaN.exe 82 PID 5064 wrote to memory of 2268 5064 9dad8.exe 83 PID 5064 wrote to memory of 2268 5064 9dad8.exe 83 PID 5064 wrote to memory of 2268 5064 9dad8.exe 83 PID 2268 wrote to memory of 4276 2268 4e0c3.exe 84 PID 2268 wrote to memory of 4276 2268 4e0c3.exe 84 PID 2268 wrote to memory of 4276 2268 4e0c3.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\c4b92f45b28fe30ca4c9d637b78ec878852ba4c8036312591446149ef0c3fefaN.exe"C:\Users\Admin\AppData\Local\Temp\c4b92f45b28fe30ca4c9d637b78ec878852ba4c8036312591446149ef0c3fefaN.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\SysWOW64\9dad8.exe"C:\Windows\system32\9dad8.exe" killauto~~c4b92f45b28fe30ca4c9d637b78ec878852ba4c8036312591446149ef0c3fefaN.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Windows\SysWOW64\4e0c3.exe"C:\Windows\system32\4e0c3.exe" killauto~~9dad8.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\SysWOW64\4e0c3.exe"C:\Windows\system32\4e0c3.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4276
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
260KB
MD56b5d0a907146cba4c04b1400b51d6a47
SHA18a8ac4d42e6053d01755b2e7b70d3470c61b1be9
SHA25694d67e0e9bfeba59e953fe94f0e4a92350d043b3b4ac28b5db557d0e0e8843f8
SHA512cf8c94a3b06fae05b78bbfa5d3693cd2089adeda769cd00d3bb6f4634b0dde634b4c645576bdc12b02f3141c74e13abd9afe8deb61f277fe2c9d82acd0760237