Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/10/2024, 19:58

General

  • Target

    c8cf34cbf3f6ecee8684ade7d0fbff125aec4ceb7bcee5017a4604d40f7bc4a9N.exe

  • Size

    78KB

  • MD5

    3ad47084ba301db62db38f1e3afca020

  • SHA1

    0d052b45092bc2f9d05be8adcabd2251724e4ff6

  • SHA256

    c8cf34cbf3f6ecee8684ade7d0fbff125aec4ceb7bcee5017a4604d40f7bc4a9

  • SHA512

    373dc8e7fa2a3f82efaa0bd4cc22ac030a00757b00e58d45f6f6130ae7f3bfc1b492b2c6ce1d05c00db4daa7aadcbf8b52de1be23a09869854ecec073c1b3eed

  • SSDEEP

    1536:I5jSTdy0MochZDsC8Kl/99Z242UdIAkn3jKZPjoYaoQtC67G9/ah1eg:I5jSyn7N041QqhgDG9/aj

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c8cf34cbf3f6ecee8684ade7d0fbff125aec4ceb7bcee5017a4604d40f7bc4a9N.exe
    "C:\Users\Admin\AppData\Local\Temp\c8cf34cbf3f6ecee8684ade7d0fbff125aec4ceb7bcee5017a4604d40f7bc4a9N.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1092
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\-rrjb_m_.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2104
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9942.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcE4406DAE4D2440EDA65173C0D95995AE.TMP"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3452
    • C:\Users\Admin\AppData\Local\Temp\tmp9829.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp9829.tmp.exe" C:\Users\Admin\AppData\Local\Temp\c8cf34cbf3f6ecee8684ade7d0fbff125aec4ceb7bcee5017a4604d40f7bc4a9N.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:4092

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\-rrjb_m_.0.vb

    Filesize

    14KB

    MD5

    6cd6bfb1854c38ae71724c954f5fc6f9

    SHA1

    e05d43144bb3c806b34d0c62b28c076eff79662c

    SHA256

    b1c0c29ef6ac7730eed34184a9cef1e23aabb5e0d6fd59c1a23f139d8986936b

    SHA512

    1c463dbe8e2e14b67adc3e2e4f0c43480b2d1863b71eb85f7bdab1131692e0edb3332836861b87918b02974144ce271f016ea452a347fbffe55397ab3548df86

  • C:\Users\Admin\AppData\Local\Temp\-rrjb_m_.cmdline

    Filesize

    266B

    MD5

    3e76175304c7037a5d3d5c39d61f95b8

    SHA1

    d764fe41a3856eeffec0b6cb381934609d451453

    SHA256

    f04aada57095d5c4885ff5835c0d99f94849e17c6f365b2c3122ec356ac924bd

    SHA512

    04e21672e1c6ee2b07cb657c653e12c4fcc6e2720c26df3ddf343b89817b540dc11c9cf93c02c17464db889a0ff1825b772455b35ab8809220cc7620ce931d8b

  • C:\Users\Admin\AppData\Local\Temp\RES9942.tmp

    Filesize

    1KB

    MD5

    9130b241b6ea4dbd1882717b5c27b1e7

    SHA1

    48f728edbd0f379b04ebed4aa1cca9a98abc476b

    SHA256

    a75e9e2e9fa321a961f97375e1b17a3732b7307e9070615ec9bd32e468434b6f

    SHA512

    67284f9ef8c6a4e98b09b5767cf7f2b56c710e19b05103d82fff1da73594f4b933bcc46d88d918591898b75fb53210d0d9d8c8e9720d769a94932729c48e2511

  • C:\Users\Admin\AppData\Local\Temp\tmp9829.tmp.exe

    Filesize

    78KB

    MD5

    3c74c101b5454555d53cd381c4470e67

    SHA1

    f06e04f8522a4f8e1b85efe223539f8a43d8e591

    SHA256

    dd07293cd27be51becc7287886927165249cd970fbafdca72820f164c98fe545

    SHA512

    cd90a1ff2aa7b9742cee8c64fdd1b5e90009cd96ac6227fa4f1af840b60b6eeadd7a9615d6ce286fd5f064cbdc7bf82ed244b1c6e95f882af3ac62cbd6db6d3d

  • C:\Users\Admin\AppData\Local\Temp\vbcE4406DAE4D2440EDA65173C0D95995AE.TMP

    Filesize

    660B

    MD5

    fb034443dc230ea5bc79a1ce9e45d840

    SHA1

    6e9abb2132eec29d8722ca2290f780cf7306835b

    SHA256

    aec42a28092dc8207f6da05fb3842269812959172701a47273038923310530b4

    SHA512

    a8b50e2dce1cdb06f543c4510b9f95412048332253d8e94d190a0fe4787cb21b2a43716649503c30cfb3b57be65a7669fa99c3593405341f738d8b94f9d1b76c

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    aa4bdac8c4e0538ec2bb4b7574c94192

    SHA1

    ef76d834232b67b27ebd75708922adea97aeacce

    SHA256

    d7dbe167a7b64a4d11e76d172c8c880020fe7e4bc9cae977ac06982584a6b430

    SHA512

    0ec342286c9dbe78dd7a371afaf405232ff6242f7e024c6640b265ba2288771297edbb5a6482848daad5007aef503e92508f1a7e1a8b8ff3fe20343b21421a65

  • memory/1092-1-0x0000000075480000-0x0000000075A31000-memory.dmp

    Filesize

    5.7MB

  • memory/1092-22-0x0000000075480000-0x0000000075A31000-memory.dmp

    Filesize

    5.7MB

  • memory/1092-0-0x0000000075482000-0x0000000075483000-memory.dmp

    Filesize

    4KB

  • memory/1092-2-0x0000000075480000-0x0000000075A31000-memory.dmp

    Filesize

    5.7MB

  • memory/2104-18-0x0000000075480000-0x0000000075A31000-memory.dmp

    Filesize

    5.7MB

  • memory/2104-9-0x0000000075480000-0x0000000075A31000-memory.dmp

    Filesize

    5.7MB

  • memory/4092-23-0x0000000075480000-0x0000000075A31000-memory.dmp

    Filesize

    5.7MB

  • memory/4092-25-0x0000000075480000-0x0000000075A31000-memory.dmp

    Filesize

    5.7MB

  • memory/4092-24-0x0000000075480000-0x0000000075A31000-memory.dmp

    Filesize

    5.7MB

  • memory/4092-27-0x0000000075480000-0x0000000075A31000-memory.dmp

    Filesize

    5.7MB

  • memory/4092-28-0x0000000075480000-0x0000000075A31000-memory.dmp

    Filesize

    5.7MB

  • memory/4092-29-0x0000000075480000-0x0000000075A31000-memory.dmp

    Filesize

    5.7MB