Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2024, 13:05
Static task
static1
Behavioral task
behavioral1
Sample
ce9e984a86f425de286533d674207ddc19ca5df723d3dc2a4334b14eaed07aa8N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ce9e984a86f425de286533d674207ddc19ca5df723d3dc2a4334b14eaed07aa8N.exe
Resource
win10v2004-20241007-en
General
-
Target
ce9e984a86f425de286533d674207ddc19ca5df723d3dc2a4334b14eaed07aa8N.exe
-
Size
78KB
-
MD5
25948a6c3218dbfcaae96f2e3c3a14f0
-
SHA1
f57137bba0e9610dac65f2780f5ffde89f693618
-
SHA256
ce9e984a86f425de286533d674207ddc19ca5df723d3dc2a4334b14eaed07aa8
-
SHA512
d2a3d3d58bae8d1293c4afd7b93253bf2b377043c94740f6720991771ce350a4c448fbbdae9baebd3f4313b97635d3ab9289e94830f3698e07b416b5c7533772
-
SSDEEP
1536:nsHHuaJtVpJywt04wbje3IgTazcoOEEQLwdCRoaeuProYMHQts9/R1ss:nsH/3DJywQjDgTLopLwdCFJzs9/l
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation ce9e984a86f425de286533d674207ddc19ca5df723d3dc2a4334b14eaed07aa8N.exe -
Deletes itself 1 IoCs
pid Process 2868 tmp9EC0.tmp.exe -
Executes dropped EXE 1 IoCs
pid Process 2868 tmp9EC0.tmp.exe -
Uses the VBS compiler for execution 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp9EC0.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ce9e984a86f425de286533d674207ddc19ca5df723d3dc2a4334b14eaed07aa8N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2140 ce9e984a86f425de286533d674207ddc19ca5df723d3dc2a4334b14eaed07aa8N.exe Token: SeDebugPrivilege 2868 tmp9EC0.tmp.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2140 wrote to memory of 2552 2140 ce9e984a86f425de286533d674207ddc19ca5df723d3dc2a4334b14eaed07aa8N.exe 85 PID 2140 wrote to memory of 2552 2140 ce9e984a86f425de286533d674207ddc19ca5df723d3dc2a4334b14eaed07aa8N.exe 85 PID 2140 wrote to memory of 2552 2140 ce9e984a86f425de286533d674207ddc19ca5df723d3dc2a4334b14eaed07aa8N.exe 85 PID 2552 wrote to memory of 2568 2552 vbc.exe 88 PID 2552 wrote to memory of 2568 2552 vbc.exe 88 PID 2552 wrote to memory of 2568 2552 vbc.exe 88 PID 2140 wrote to memory of 2868 2140 ce9e984a86f425de286533d674207ddc19ca5df723d3dc2a4334b14eaed07aa8N.exe 89 PID 2140 wrote to memory of 2868 2140 ce9e984a86f425de286533d674207ddc19ca5df723d3dc2a4334b14eaed07aa8N.exe 89 PID 2140 wrote to memory of 2868 2140 ce9e984a86f425de286533d674207ddc19ca5df723d3dc2a4334b14eaed07aa8N.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\ce9e984a86f425de286533d674207ddc19ca5df723d3dc2a4334b14eaed07aa8N.exe"C:\Users\Admin\AppData\Local\Temp\ce9e984a86f425de286533d674207ddc19ca5df723d3dc2a4334b14eaed07aa8N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\mt-huokp.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA076.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcFB5E14BBC28A42879583C428C52DAD7F.TMP"3⤵
- System Location Discovery: System Language Discovery
PID:2568
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp9EC0.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9EC0.tmp.exe" C:\Users\Admin\AppData\Local\Temp\ce9e984a86f425de286533d674207ddc19ca5df723d3dc2a4334b14eaed07aa8N.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2868
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD534db7441b79dd50e310dbb8d3c28a978
SHA18bf7b685b138761da7ae0d39e49323edf9fbc80d
SHA25651fea2610b15c7d6d40972e61264d673a818876ecbc5c8b50a5e8d18838ed4ee
SHA51210a13d68dfa8fa0ee17f76332425a5cb5007606103e8e57061942b72d0796acd1a092bcac50f22b059d134b18abdd29d7aea68fe0138d38afa99a8671530b1cd
-
Filesize
15KB
MD56135427a2479e41b5ddd1e781f77037c
SHA12f6fcf2a9c2d043f5cd4b201955fbfaf5e92a8e9
SHA2565f82400f247b878b87479604cc7038db316bbbd99839b596200798d0170cce01
SHA512aa079eb4463eb22eb835ccbb11401318f35f960d34994402083e5477c6f209d9b2b7f7e484e170ea60b79339a957bfdeaa6592730bdaae7543e85b580189b688
-
Filesize
266B
MD5eb63ade317276d7ada92e583423f772a
SHA1e146b0fd9365eeb61bd68184b033529698def773
SHA25625ffb42cf60e2c3c8dde5f774b6aede5c5a42fd5da5ebbdaa54abdbad7d30fad
SHA512bdae934a432d751a45b85db94c9f6bfbc26688d577370d8f746673e66b3c01197b98ef5b1d9f5d52d7a292dc9736fe1ca9cb7f0f0c0cf784a841f9e48e2fc4c6
-
Filesize
78KB
MD5fdb15180dd8784926993af3c0fc9dbb7
SHA1865921d746c20169ad7b644ac4871b1dd8b20d8c
SHA25697ea9b3871653a7356dc14234b13ed1e8a8e696aefb3f6b895cc8bac544dc298
SHA512d72abbeb05a4598319497e8f471fb216f0c03264d6d64788518d4ee18740b65a71dbf1df932853b0c94c692e1b7aa1b828c9af007368e6fb29ba640d52d6feee
-
Filesize
660B
MD5506eee38bf9f482ccdb0bd4f0a7fcfa6
SHA1140294b0d6195302026931d0d9c8b1af1a896aed
SHA2568ec902312f8d89c7d659ada0c03862c6e149acd5b5ddb05d2b3320b369f52d24
SHA512279553ad2abebdef650f9af563d9f1ea5fef5bc5896f00fcac43ecae4ff3d1f96054ede617ab8edee0bb28fb2679f079a1adfeba675b1093f063c14e994f7b8a
-
Filesize
62KB
MD5484967ab9def8ff17dd55476ca137721
SHA1a84012f673fe1ac9041e7827cc3de4b20a1194e2
SHA2569c0a54047f133cf4e3e4444aa57cc576c566218217ea02ad7c04a408ad01791b
SHA5121e9a0cc800543dada73e551ee714001c4d6c57a595ea2986a4dd8889d1dffd1557735580c694e5feb0b7c27c1a4b3e71a95fab8baf80839f42f80e2109cbe2d7