Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/10/2024, 00:24

General

  • Target

    c899ef4ca4d00a1f74ea670d589fa9426bceae11bc14b268b695034226022ba6N.exe

  • Size

    78KB

  • MD5

    970c82b0bcea5031ceb690f522bfd8e0

  • SHA1

    f33c8f7c04118929b458c076f33d0db114a8c885

  • SHA256

    c899ef4ca4d00a1f74ea670d589fa9426bceae11bc14b268b695034226022ba6

  • SHA512

    43e9b54de9748cf207bd47ef6e3051aace1ae80c23f36cd1f18f7e6c9624e5d07b8ef24d33f3a36525f5e4b5826e49f61240de09667987e6427972bfd030b7da

  • SSDEEP

    1536:FPCHFo6M7t4XT0XRhyRjVf3hTzdEzcEGvCZ1Hc5RPuoYciQtl9/Y15M:FPCHFonhASyRxvhTzXPvCbW2Ul9/r

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c899ef4ca4d00a1f74ea670d589fa9426bceae11bc14b268b695034226022ba6N.exe
    "C:\Users\Admin\AppData\Local\Temp\c899ef4ca4d00a1f74ea670d589fa9426bceae11bc14b268b695034226022ba6N.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1780
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\1z2ywwa-.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:880
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB873.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcD0702877D41B4941BB86CC4763ACCD3A.TMP"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2796
    • C:\Users\Admin\AppData\Local\Temp\tmpB71B.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmpB71B.tmp.exe" C:\Users\Admin\AppData\Local\Temp\c899ef4ca4d00a1f74ea670d589fa9426bceae11bc14b268b695034226022ba6N.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:4856

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\1z2ywwa-.0.vb

    Filesize

    15KB

    MD5

    a2f8a5dc6ed2f7a9e6d8c2237a1fba49

    SHA1

    9960f8b3ce95d0c0b73297cb040a590a1f1ec783

    SHA256

    1a7193065ccf188cbcb6839eb7a364e86bd2d059f32e59813dee5dafd523e971

    SHA512

    dd331939a1664013dcccc968bf09abf809ca9fe96cb92726e1268d585c0a23c4c6dd0ba621810f973c1c2300bdbb3fb799f8cf9c9cbcf28f4a635f40bd6b98cd

  • C:\Users\Admin\AppData\Local\Temp\1z2ywwa-.cmdline

    Filesize

    266B

    MD5

    9a3f1070ebbef45137d2030e6ab4c92f

    SHA1

    e1791e8687588e33761da54360f5bb9dc791e30f

    SHA256

    ea8d28c6673bf691df108f935628793bcd1eec89a6c53816de544f18e3354b27

    SHA512

    211be2999c40952ab2cfbdd0c19c261db27b34553a98fe18feb1addf498ae3c46f257a0a23148835ac21cb285130fc332c928e058c5b8b802da1bc1ddacaa14b

  • C:\Users\Admin\AppData\Local\Temp\RESB873.tmp

    Filesize

    1KB

    MD5

    7a507ce50f2086d645eaa4c1b68aa98a

    SHA1

    f587eb7ff5237d0ca25230622ed2205b1eb33106

    SHA256

    8c44892d88c6a1cb31b0908af47e46f086b1c09193b31d029e293cc16221f6af

    SHA512

    cdfe3f31c5c794415ad83488292950770aa7f8cb76ba1c636261125070b5f4531da7de071cd9207ed500ff69950166b1b6634c5cb5d47e788b3fa02e624fbdd6

  • C:\Users\Admin\AppData\Local\Temp\tmpB71B.tmp.exe

    Filesize

    78KB

    MD5

    30b66d6d35fdeba6deb58142e36e204d

    SHA1

    1ebe641f55c2d6d510c3bf27043a99b2d57dec9e

    SHA256

    5cb56862cede57f5ee5763d78636caa3d2d8dcfcb02a5ae315ce7c6306b9cef1

    SHA512

    75cd21f2bc5da028f168c8d3d7f38146845744282c81d34049e740194e4bead9620692145870cf7b7ffc41842d39a077a1179555cd2e1ea075065daebb63aa69

  • C:\Users\Admin\AppData\Local\Temp\vbcD0702877D41B4941BB86CC4763ACCD3A.TMP

    Filesize

    660B

    MD5

    5e1f2a72c200c982a65a5698104c0170

    SHA1

    e048c67a1eb8347ba97f1932470e147996a5cb98

    SHA256

    fcfa4c94188902a0e747b877f98f225f58b0616d8b73bbe5622ec066748a56f9

    SHA512

    c2853c704e1facc8d8a621e3b36897fd493b2e5448352726e920433e849a9676f65d44cd5b8551e1df14275d36807d92e509129934e4e63c7a3ea39b69084fc3

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    8fd8e054ba10661e530e54511658ac20

    SHA1

    72911622012ddf68f95c1e1424894ecb4442e6fd

    SHA256

    822d92b6f2bd74ba785aa1555b5963c9d7736be1a41241927343dff1caf538d7

    SHA512

    c14d729a30b055df18cfac5258c30574ca93bd05fb9a86b4be47ed041c7a4ceefa636bf1c2dd0ccd4c922eda785ce80127374fb70f965c1cf7cd323da5c1b24c

  • memory/880-18-0x0000000075280000-0x0000000075831000-memory.dmp

    Filesize

    5.7MB

  • memory/880-9-0x0000000075280000-0x0000000075831000-memory.dmp

    Filesize

    5.7MB

  • memory/1780-22-0x0000000075280000-0x0000000075831000-memory.dmp

    Filesize

    5.7MB

  • memory/1780-0-0x0000000075282000-0x0000000075283000-memory.dmp

    Filesize

    4KB

  • memory/1780-1-0x0000000075280000-0x0000000075831000-memory.dmp

    Filesize

    5.7MB

  • memory/1780-2-0x0000000075280000-0x0000000075831000-memory.dmp

    Filesize

    5.7MB

  • memory/4856-23-0x0000000075280000-0x0000000075831000-memory.dmp

    Filesize

    5.7MB

  • memory/4856-24-0x0000000075280000-0x0000000075831000-memory.dmp

    Filesize

    5.7MB

  • memory/4856-26-0x0000000075280000-0x0000000075831000-memory.dmp

    Filesize

    5.7MB

  • memory/4856-27-0x0000000075280000-0x0000000075831000-memory.dmp

    Filesize

    5.7MB

  • memory/4856-28-0x0000000075280000-0x0000000075831000-memory.dmp

    Filesize

    5.7MB

  • memory/4856-29-0x0000000075280000-0x0000000075831000-memory.dmp

    Filesize

    5.7MB

  • memory/4856-30-0x0000000075280000-0x0000000075831000-memory.dmp

    Filesize

    5.7MB