Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/10/2024, 00:24
Static task
static1
Behavioral task
behavioral1
Sample
c899ef4ca4d00a1f74ea670d589fa9426bceae11bc14b268b695034226022ba6N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c899ef4ca4d00a1f74ea670d589fa9426bceae11bc14b268b695034226022ba6N.exe
Resource
win10v2004-20241007-en
General
-
Target
c899ef4ca4d00a1f74ea670d589fa9426bceae11bc14b268b695034226022ba6N.exe
-
Size
78KB
-
MD5
970c82b0bcea5031ceb690f522bfd8e0
-
SHA1
f33c8f7c04118929b458c076f33d0db114a8c885
-
SHA256
c899ef4ca4d00a1f74ea670d589fa9426bceae11bc14b268b695034226022ba6
-
SHA512
43e9b54de9748cf207bd47ef6e3051aace1ae80c23f36cd1f18f7e6c9624e5d07b8ef24d33f3a36525f5e4b5826e49f61240de09667987e6427972bfd030b7da
-
SSDEEP
1536:FPCHFo6M7t4XT0XRhyRjVf3hTzdEzcEGvCZ1Hc5RPuoYciQtl9/Y15M:FPCHFonhASyRxvhTzXPvCbW2Ul9/r
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation c899ef4ca4d00a1f74ea670d589fa9426bceae11bc14b268b695034226022ba6N.exe -
Executes dropped EXE 1 IoCs
pid Process 4856 tmpB71B.tmp.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\aspnet_state_perf = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\System.Web.exe\"" tmpB71B.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c899ef4ca4d00a1f74ea670d589fa9426bceae11bc14b268b695034226022ba6N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpB71B.tmp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1780 c899ef4ca4d00a1f74ea670d589fa9426bceae11bc14b268b695034226022ba6N.exe Token: SeDebugPrivilege 4856 tmpB71B.tmp.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1780 wrote to memory of 880 1780 c899ef4ca4d00a1f74ea670d589fa9426bceae11bc14b268b695034226022ba6N.exe 84 PID 1780 wrote to memory of 880 1780 c899ef4ca4d00a1f74ea670d589fa9426bceae11bc14b268b695034226022ba6N.exe 84 PID 1780 wrote to memory of 880 1780 c899ef4ca4d00a1f74ea670d589fa9426bceae11bc14b268b695034226022ba6N.exe 84 PID 880 wrote to memory of 2796 880 vbc.exe 87 PID 880 wrote to memory of 2796 880 vbc.exe 87 PID 880 wrote to memory of 2796 880 vbc.exe 87 PID 1780 wrote to memory of 4856 1780 c899ef4ca4d00a1f74ea670d589fa9426bceae11bc14b268b695034226022ba6N.exe 90 PID 1780 wrote to memory of 4856 1780 c899ef4ca4d00a1f74ea670d589fa9426bceae11bc14b268b695034226022ba6N.exe 90 PID 1780 wrote to memory of 4856 1780 c899ef4ca4d00a1f74ea670d589fa9426bceae11bc14b268b695034226022ba6N.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\c899ef4ca4d00a1f74ea670d589fa9426bceae11bc14b268b695034226022ba6N.exe"C:\Users\Admin\AppData\Local\Temp\c899ef4ca4d00a1f74ea670d589fa9426bceae11bc14b268b695034226022ba6N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\1z2ywwa-.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB873.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcD0702877D41B4941BB86CC4763ACCD3A.TMP"3⤵
- System Location Discovery: System Language Discovery
PID:2796
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmpB71B.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpB71B.tmp.exe" C:\Users\Admin\AppData\Local\Temp\c899ef4ca4d00a1f74ea670d589fa9426bceae11bc14b268b695034226022ba6N.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4856
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD5a2f8a5dc6ed2f7a9e6d8c2237a1fba49
SHA19960f8b3ce95d0c0b73297cb040a590a1f1ec783
SHA2561a7193065ccf188cbcb6839eb7a364e86bd2d059f32e59813dee5dafd523e971
SHA512dd331939a1664013dcccc968bf09abf809ca9fe96cb92726e1268d585c0a23c4c6dd0ba621810f973c1c2300bdbb3fb799f8cf9c9cbcf28f4a635f40bd6b98cd
-
Filesize
266B
MD59a3f1070ebbef45137d2030e6ab4c92f
SHA1e1791e8687588e33761da54360f5bb9dc791e30f
SHA256ea8d28c6673bf691df108f935628793bcd1eec89a6c53816de544f18e3354b27
SHA512211be2999c40952ab2cfbdd0c19c261db27b34553a98fe18feb1addf498ae3c46f257a0a23148835ac21cb285130fc332c928e058c5b8b802da1bc1ddacaa14b
-
Filesize
1KB
MD57a507ce50f2086d645eaa4c1b68aa98a
SHA1f587eb7ff5237d0ca25230622ed2205b1eb33106
SHA2568c44892d88c6a1cb31b0908af47e46f086b1c09193b31d029e293cc16221f6af
SHA512cdfe3f31c5c794415ad83488292950770aa7f8cb76ba1c636261125070b5f4531da7de071cd9207ed500ff69950166b1b6634c5cb5d47e788b3fa02e624fbdd6
-
Filesize
78KB
MD530b66d6d35fdeba6deb58142e36e204d
SHA11ebe641f55c2d6d510c3bf27043a99b2d57dec9e
SHA2565cb56862cede57f5ee5763d78636caa3d2d8dcfcb02a5ae315ce7c6306b9cef1
SHA51275cd21f2bc5da028f168c8d3d7f38146845744282c81d34049e740194e4bead9620692145870cf7b7ffc41842d39a077a1179555cd2e1ea075065daebb63aa69
-
Filesize
660B
MD55e1f2a72c200c982a65a5698104c0170
SHA1e048c67a1eb8347ba97f1932470e147996a5cb98
SHA256fcfa4c94188902a0e747b877f98f225f58b0616d8b73bbe5622ec066748a56f9
SHA512c2853c704e1facc8d8a621e3b36897fd493b2e5448352726e920433e849a9676f65d44cd5b8551e1df14275d36807d92e509129934e4e63c7a3ea39b69084fc3
-
Filesize
62KB
MD58fd8e054ba10661e530e54511658ac20
SHA172911622012ddf68f95c1e1424894ecb4442e6fd
SHA256822d92b6f2bd74ba785aa1555b5963c9d7736be1a41241927343dff1caf538d7
SHA512c14d729a30b055df18cfac5258c30574ca93bd05fb9a86b4be47ed041c7a4ceefa636bf1c2dd0ccd4c922eda785ce80127374fb70f965c1cf7cd323da5c1b24c