Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/10/2024, 19:58
Static task
static1
Behavioral task
behavioral1
Sample
c8cf34cbf3f6ecee8684ade7d0fbff125aec4ceb7bcee5017a4604d40f7bc4a9N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c8cf34cbf3f6ecee8684ade7d0fbff125aec4ceb7bcee5017a4604d40f7bc4a9N.exe
Resource
win10v2004-20241007-en
General
-
Target
c8cf34cbf3f6ecee8684ade7d0fbff125aec4ceb7bcee5017a4604d40f7bc4a9N.exe
-
Size
78KB
-
MD5
3ad47084ba301db62db38f1e3afca020
-
SHA1
0d052b45092bc2f9d05be8adcabd2251724e4ff6
-
SHA256
c8cf34cbf3f6ecee8684ade7d0fbff125aec4ceb7bcee5017a4604d40f7bc4a9
-
SHA512
373dc8e7fa2a3f82efaa0bd4cc22ac030a00757b00e58d45f6f6130ae7f3bfc1b492b2c6ce1d05c00db4daa7aadcbf8b52de1be23a09869854ecec073c1b3eed
-
SSDEEP
1536:I5jSTdy0MochZDsC8Kl/99Z242UdIAkn3jKZPjoYaoQtC67G9/ah1eg:I5jSyn7N041QqhgDG9/aj
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation c8cf34cbf3f6ecee8684ade7d0fbff125aec4ceb7bcee5017a4604d40f7bc4a9N.exe -
Executes dropped EXE 1 IoCs
pid Process 4092 tmp9829.tmp.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System.XML = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\AppLaunch.exe\"" tmp9829.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c8cf34cbf3f6ecee8684ade7d0fbff125aec4ceb7bcee5017a4604d40f7bc4a9N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp9829.tmp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1092 c8cf34cbf3f6ecee8684ade7d0fbff125aec4ceb7bcee5017a4604d40f7bc4a9N.exe Token: SeDebugPrivilege 4092 tmp9829.tmp.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1092 wrote to memory of 2104 1092 c8cf34cbf3f6ecee8684ade7d0fbff125aec4ceb7bcee5017a4604d40f7bc4a9N.exe 85 PID 1092 wrote to memory of 2104 1092 c8cf34cbf3f6ecee8684ade7d0fbff125aec4ceb7bcee5017a4604d40f7bc4a9N.exe 85 PID 1092 wrote to memory of 2104 1092 c8cf34cbf3f6ecee8684ade7d0fbff125aec4ceb7bcee5017a4604d40f7bc4a9N.exe 85 PID 2104 wrote to memory of 3452 2104 vbc.exe 88 PID 2104 wrote to memory of 3452 2104 vbc.exe 88 PID 2104 wrote to memory of 3452 2104 vbc.exe 88 PID 1092 wrote to memory of 4092 1092 c8cf34cbf3f6ecee8684ade7d0fbff125aec4ceb7bcee5017a4604d40f7bc4a9N.exe 89 PID 1092 wrote to memory of 4092 1092 c8cf34cbf3f6ecee8684ade7d0fbff125aec4ceb7bcee5017a4604d40f7bc4a9N.exe 89 PID 1092 wrote to memory of 4092 1092 c8cf34cbf3f6ecee8684ade7d0fbff125aec4ceb7bcee5017a4604d40f7bc4a9N.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\c8cf34cbf3f6ecee8684ade7d0fbff125aec4ceb7bcee5017a4604d40f7bc4a9N.exe"C:\Users\Admin\AppData\Local\Temp\c8cf34cbf3f6ecee8684ade7d0fbff125aec4ceb7bcee5017a4604d40f7bc4a9N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\-rrjb_m_.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9942.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcE4406DAE4D2440EDA65173C0D95995AE.TMP"3⤵
- System Location Discovery: System Language Discovery
PID:3452
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp9829.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9829.tmp.exe" C:\Users\Admin\AppData\Local\Temp\c8cf34cbf3f6ecee8684ade7d0fbff125aec4ceb7bcee5017a4604d40f7bc4a9N.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4092
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD56cd6bfb1854c38ae71724c954f5fc6f9
SHA1e05d43144bb3c806b34d0c62b28c076eff79662c
SHA256b1c0c29ef6ac7730eed34184a9cef1e23aabb5e0d6fd59c1a23f139d8986936b
SHA5121c463dbe8e2e14b67adc3e2e4f0c43480b2d1863b71eb85f7bdab1131692e0edb3332836861b87918b02974144ce271f016ea452a347fbffe55397ab3548df86
-
Filesize
266B
MD53e76175304c7037a5d3d5c39d61f95b8
SHA1d764fe41a3856eeffec0b6cb381934609d451453
SHA256f04aada57095d5c4885ff5835c0d99f94849e17c6f365b2c3122ec356ac924bd
SHA51204e21672e1c6ee2b07cb657c653e12c4fcc6e2720c26df3ddf343b89817b540dc11c9cf93c02c17464db889a0ff1825b772455b35ab8809220cc7620ce931d8b
-
Filesize
1KB
MD59130b241b6ea4dbd1882717b5c27b1e7
SHA148f728edbd0f379b04ebed4aa1cca9a98abc476b
SHA256a75e9e2e9fa321a961f97375e1b17a3732b7307e9070615ec9bd32e468434b6f
SHA51267284f9ef8c6a4e98b09b5767cf7f2b56c710e19b05103d82fff1da73594f4b933bcc46d88d918591898b75fb53210d0d9d8c8e9720d769a94932729c48e2511
-
Filesize
78KB
MD53c74c101b5454555d53cd381c4470e67
SHA1f06e04f8522a4f8e1b85efe223539f8a43d8e591
SHA256dd07293cd27be51becc7287886927165249cd970fbafdca72820f164c98fe545
SHA512cd90a1ff2aa7b9742cee8c64fdd1b5e90009cd96ac6227fa4f1af840b60b6eeadd7a9615d6ce286fd5f064cbdc7bf82ed244b1c6e95f882af3ac62cbd6db6d3d
-
Filesize
660B
MD5fb034443dc230ea5bc79a1ce9e45d840
SHA16e9abb2132eec29d8722ca2290f780cf7306835b
SHA256aec42a28092dc8207f6da05fb3842269812959172701a47273038923310530b4
SHA512a8b50e2dce1cdb06f543c4510b9f95412048332253d8e94d190a0fe4787cb21b2a43716649503c30cfb3b57be65a7669fa99c3593405341f738d8b94f9d1b76c
-
Filesize
62KB
MD5aa4bdac8c4e0538ec2bb4b7574c94192
SHA1ef76d834232b67b27ebd75708922adea97aeacce
SHA256d7dbe167a7b64a4d11e76d172c8c880020fe7e4bc9cae977ac06982584a6b430
SHA5120ec342286c9dbe78dd7a371afaf405232ff6242f7e024c6640b265ba2288771297edbb5a6482848daad5007aef503e92508f1a7e1a8b8ff3fe20343b21421a65