Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/10/2024, 02:58
Static task
static1
Behavioral task
behavioral1
Sample
ed394bbed813e66e1222a28194b57d4c7e620c2e44e2d3177b871df4aaa075fc.exe
Resource
win7-20240903-en
General
-
Target
ed394bbed813e66e1222a28194b57d4c7e620c2e44e2d3177b871df4aaa075fc.exe
-
Size
1.4MB
-
MD5
21ef66b35da57ca5d92b39de1c741f51
-
SHA1
2943ee9ad20ff5a3796cbe5ddb8f323a00edb042
-
SHA256
ed394bbed813e66e1222a28194b57d4c7e620c2e44e2d3177b871df4aaa075fc
-
SHA512
a79e25bdaacf86edcd3df9174bd708bdfadf6eb61b13833fbc90838fd8b08ca9c7e98b603c3aa889ce426918709b68cce14c639de3e1dfe507cdd0bc08b67c13
-
SSDEEP
3072:iyf8n+BnNpiXN5U+M/hQuaCA3VMxDJAQO7LN:i/+BnNpCqP/hQuavirOH
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation ed394bbed813e66e1222a28194b57d4c7e620c2e44e2d3177b871df4aaa075fc.exe -
Executes dropped EXE 6 IoCs
pid Process 4536 winlogon.exe 3912 winlogon.exe 4580 winlogon.exe 4156 winlogon.exe 1884 winlogon.exe 2560 winlogon.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 3672 set thread context of 3560 3672 ed394bbed813e66e1222a28194b57d4c7e620c2e44e2d3177b871df4aaa075fc.exe 84 PID 4536 set thread context of 3912 4536 winlogon.exe 91 PID 3912 set thread context of 4580 3912 winlogon.exe 92 PID 3912 set thread context of 4156 3912 winlogon.exe 99 PID 3912 set thread context of 1884 3912 winlogon.exe 102 PID 3912 set thread context of 2560 3912 winlogon.exe 105 -
resource yara_rule behavioral2/memory/3560-0-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/3560-3-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/3560-4-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/3560-14-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/3912-23-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/3912-20-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/3912-28-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/3912-34-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/3912-40-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/3912-45-0x0000000000400000-0x000000000041C000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
pid pid_target Process procid_target 1028 4580 WerFault.exe 92 5028 4156 WerFault.exe 99 3164 1884 WerFault.exe 102 2920 2560 WerFault.exe 105 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ed394bbed813e66e1222a28194b57d4c7e620c2e44e2d3177b871df4aaa075fc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ed394bbed813e66e1222a28194b57d4c7e620c2e44e2d3177b871df4aaa075fc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3560 ed394bbed813e66e1222a28194b57d4c7e620c2e44e2d3177b871df4aaa075fc.exe 3912 winlogon.exe -
Suspicious use of WriteProcessMemory 57 IoCs
description pid Process procid_target PID 3672 wrote to memory of 2036 3672 ed394bbed813e66e1222a28194b57d4c7e620c2e44e2d3177b871df4aaa075fc.exe 83 PID 3672 wrote to memory of 2036 3672 ed394bbed813e66e1222a28194b57d4c7e620c2e44e2d3177b871df4aaa075fc.exe 83 PID 3672 wrote to memory of 2036 3672 ed394bbed813e66e1222a28194b57d4c7e620c2e44e2d3177b871df4aaa075fc.exe 83 PID 3672 wrote to memory of 3560 3672 ed394bbed813e66e1222a28194b57d4c7e620c2e44e2d3177b871df4aaa075fc.exe 84 PID 3672 wrote to memory of 3560 3672 ed394bbed813e66e1222a28194b57d4c7e620c2e44e2d3177b871df4aaa075fc.exe 84 PID 3672 wrote to memory of 3560 3672 ed394bbed813e66e1222a28194b57d4c7e620c2e44e2d3177b871df4aaa075fc.exe 84 PID 3672 wrote to memory of 3560 3672 ed394bbed813e66e1222a28194b57d4c7e620c2e44e2d3177b871df4aaa075fc.exe 84 PID 3672 wrote to memory of 3560 3672 ed394bbed813e66e1222a28194b57d4c7e620c2e44e2d3177b871df4aaa075fc.exe 84 PID 3672 wrote to memory of 3560 3672 ed394bbed813e66e1222a28194b57d4c7e620c2e44e2d3177b871df4aaa075fc.exe 84 PID 3672 wrote to memory of 3560 3672 ed394bbed813e66e1222a28194b57d4c7e620c2e44e2d3177b871df4aaa075fc.exe 84 PID 3672 wrote to memory of 3560 3672 ed394bbed813e66e1222a28194b57d4c7e620c2e44e2d3177b871df4aaa075fc.exe 84 PID 3560 wrote to memory of 4536 3560 ed394bbed813e66e1222a28194b57d4c7e620c2e44e2d3177b871df4aaa075fc.exe 88 PID 3560 wrote to memory of 4536 3560 ed394bbed813e66e1222a28194b57d4c7e620c2e44e2d3177b871df4aaa075fc.exe 88 PID 3560 wrote to memory of 4536 3560 ed394bbed813e66e1222a28194b57d4c7e620c2e44e2d3177b871df4aaa075fc.exe 88 PID 4536 wrote to memory of 3144 4536 winlogon.exe 90 PID 4536 wrote to memory of 3144 4536 winlogon.exe 90 PID 4536 wrote to memory of 3144 4536 winlogon.exe 90 PID 4536 wrote to memory of 3912 4536 winlogon.exe 91 PID 4536 wrote to memory of 3912 4536 winlogon.exe 91 PID 4536 wrote to memory of 3912 4536 winlogon.exe 91 PID 4536 wrote to memory of 3912 4536 winlogon.exe 91 PID 4536 wrote to memory of 3912 4536 winlogon.exe 91 PID 4536 wrote to memory of 3912 4536 winlogon.exe 91 PID 4536 wrote to memory of 3912 4536 winlogon.exe 91 PID 4536 wrote to memory of 3912 4536 winlogon.exe 91 PID 3912 wrote to memory of 4580 3912 winlogon.exe 92 PID 3912 wrote to memory of 4580 3912 winlogon.exe 92 PID 3912 wrote to memory of 4580 3912 winlogon.exe 92 PID 3912 wrote to memory of 4580 3912 winlogon.exe 92 PID 3912 wrote to memory of 4580 3912 winlogon.exe 92 PID 3912 wrote to memory of 4580 3912 winlogon.exe 92 PID 3912 wrote to memory of 4580 3912 winlogon.exe 92 PID 3912 wrote to memory of 4580 3912 winlogon.exe 92 PID 3912 wrote to memory of 4156 3912 winlogon.exe 99 PID 3912 wrote to memory of 4156 3912 winlogon.exe 99 PID 3912 wrote to memory of 4156 3912 winlogon.exe 99 PID 3912 wrote to memory of 4156 3912 winlogon.exe 99 PID 3912 wrote to memory of 4156 3912 winlogon.exe 99 PID 3912 wrote to memory of 4156 3912 winlogon.exe 99 PID 3912 wrote to memory of 4156 3912 winlogon.exe 99 PID 3912 wrote to memory of 4156 3912 winlogon.exe 99 PID 3912 wrote to memory of 1884 3912 winlogon.exe 102 PID 3912 wrote to memory of 1884 3912 winlogon.exe 102 PID 3912 wrote to memory of 1884 3912 winlogon.exe 102 PID 3912 wrote to memory of 1884 3912 winlogon.exe 102 PID 3912 wrote to memory of 1884 3912 winlogon.exe 102 PID 3912 wrote to memory of 1884 3912 winlogon.exe 102 PID 3912 wrote to memory of 1884 3912 winlogon.exe 102 PID 3912 wrote to memory of 1884 3912 winlogon.exe 102 PID 3912 wrote to memory of 2560 3912 winlogon.exe 105 PID 3912 wrote to memory of 2560 3912 winlogon.exe 105 PID 3912 wrote to memory of 2560 3912 winlogon.exe 105 PID 3912 wrote to memory of 2560 3912 winlogon.exe 105 PID 3912 wrote to memory of 2560 3912 winlogon.exe 105 PID 3912 wrote to memory of 2560 3912 winlogon.exe 105 PID 3912 wrote to memory of 2560 3912 winlogon.exe 105 PID 3912 wrote to memory of 2560 3912 winlogon.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed394bbed813e66e1222a28194b57d4c7e620c2e44e2d3177b871df4aaa075fc.exe"C:\Users\Admin\AppData\Local\Temp\ed394bbed813e66e1222a28194b57d4c7e620c2e44e2d3177b871df4aaa075fc.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\\svchost.exe2⤵PID:2036
-
-
C:\Users\Admin\AppData\Local\Temp\ed394bbed813e66e1222a28194b57d4c7e620c2e44e2d3177b871df4aaa075fc.exe
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3560 -
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\\svchost.exe4⤵PID:3144
-
-
C:\Users\Admin\E696D64614\winlogon.exe
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"5⤵
- Executes dropped EXE
PID:4580 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4580 -s 126⤵
- Program crash
PID:1028
-
-
-
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"5⤵
- Executes dropped EXE
PID:4156 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4156 -s 126⤵
- Program crash
PID:5028
-
-
-
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"5⤵
- Executes dropped EXE
PID:1884 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1884 -s 126⤵
- Program crash
PID:3164
-
-
-
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"5⤵
- Executes dropped EXE
PID:2560 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2560 -s 126⤵
- Program crash
PID:2920
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4580 -ip 45801⤵PID:1040
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4156 -ip 41561⤵PID:3988
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1884 -ip 18841⤵PID:4824
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2560 -ip 25601⤵PID:3936
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD521ef66b35da57ca5d92b39de1c741f51
SHA12943ee9ad20ff5a3796cbe5ddb8f323a00edb042
SHA256ed394bbed813e66e1222a28194b57d4c7e620c2e44e2d3177b871df4aaa075fc
SHA512a79e25bdaacf86edcd3df9174bd708bdfadf6eb61b13833fbc90838fd8b08ca9c7e98b603c3aa889ce426918709b68cce14c639de3e1dfe507cdd0bc08b67c13