Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2024, 09:27
Behavioral task
behavioral1
Sample
c597a3de3db7b77b11beb33640dca13812dbc26cf291856810bd170039b17183N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c597a3de3db7b77b11beb33640dca13812dbc26cf291856810bd170039b17183N.exe
Resource
win10v2004-20241007-en
General
-
Target
c597a3de3db7b77b11beb33640dca13812dbc26cf291856810bd170039b17183N.exe
-
Size
27KB
-
MD5
3eaff8ce09f497995f5be4dc1b3aa820
-
SHA1
f2b7c3546b6f55d2c797eeb2b8ed2a37e05e16e1
-
SHA256
c597a3de3db7b77b11beb33640dca13812dbc26cf291856810bd170039b17183
-
SHA512
41d223f11aa428a5e262783bf732ffabb967785c7f2a7299b259f1398bb64b4a1ab3478e7e11312268fd86ee824d0f7f33c2b1b1aa5a31754c168ca4d8a26b62
-
SSDEEP
384:tjLyib+vLGgkhRzeTwIiTSmLPeJ97MaAQk93vmhm7UMKmIEecKdbXTzm9bVhcax8:9lgKNzevO7aA/vMHTi9bDx
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation c597a3de3db7b77b11beb33640dca13812dbc26cf291856810bd170039b17183N.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnk c597a3de3db7b77b11beb33640dca13812dbc26cf291856810bd170039b17183N.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnk Payload.exe -
Executes dropped EXE 1 IoCs
pid Process 4760 Payload.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows2 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Payload.exe" c597a3de3db7b77b11beb33640dca13812dbc26cf291856810bd170039b17183N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c597a3de3db7b77b11beb33640dca13812dbc26cf291856810bd170039b17183N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Payload.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe -
Suspicious use of AdjustPrivilegeToken 27 IoCs
description pid Process Token: SeDebugPrivilege 4760 Payload.exe Token: 33 4760 Payload.exe Token: SeIncBasePriorityPrivilege 4760 Payload.exe Token: 33 4760 Payload.exe Token: SeIncBasePriorityPrivilege 4760 Payload.exe Token: 33 4760 Payload.exe Token: SeIncBasePriorityPrivilege 4760 Payload.exe Token: 33 4760 Payload.exe Token: SeIncBasePriorityPrivilege 4760 Payload.exe Token: 33 4760 Payload.exe Token: SeIncBasePriorityPrivilege 4760 Payload.exe Token: 33 4760 Payload.exe Token: SeIncBasePriorityPrivilege 4760 Payload.exe Token: 33 4760 Payload.exe Token: SeIncBasePriorityPrivilege 4760 Payload.exe Token: 33 4760 Payload.exe Token: SeIncBasePriorityPrivilege 4760 Payload.exe Token: 33 4760 Payload.exe Token: SeIncBasePriorityPrivilege 4760 Payload.exe Token: 33 4760 Payload.exe Token: SeIncBasePriorityPrivilege 4760 Payload.exe Token: 33 4760 Payload.exe Token: SeIncBasePriorityPrivilege 4760 Payload.exe Token: 33 4760 Payload.exe Token: SeIncBasePriorityPrivilege 4760 Payload.exe Token: 33 4760 Payload.exe Token: SeIncBasePriorityPrivilege 4760 Payload.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4616 wrote to memory of 4760 4616 c597a3de3db7b77b11beb33640dca13812dbc26cf291856810bd170039b17183N.exe 91 PID 4616 wrote to memory of 4760 4616 c597a3de3db7b77b11beb33640dca13812dbc26cf291856810bd170039b17183N.exe 91 PID 4616 wrote to memory of 4760 4616 c597a3de3db7b77b11beb33640dca13812dbc26cf291856810bd170039b17183N.exe 91 PID 4616 wrote to memory of 724 4616 c597a3de3db7b77b11beb33640dca13812dbc26cf291856810bd170039b17183N.exe 92 PID 4616 wrote to memory of 724 4616 c597a3de3db7b77b11beb33640dca13812dbc26cf291856810bd170039b17183N.exe 92 PID 4616 wrote to memory of 724 4616 c597a3de3db7b77b11beb33640dca13812dbc26cf291856810bd170039b17183N.exe 92 PID 4760 wrote to memory of 1728 4760 Payload.exe 100 PID 4760 wrote to memory of 1728 4760 Payload.exe 100 PID 4760 wrote to memory of 1728 4760 Payload.exe 100 PID 4760 wrote to memory of 4208 4760 Payload.exe 102 PID 4760 wrote to memory of 4208 4760 Payload.exe 102 PID 4760 wrote to memory of 4208 4760 Payload.exe 102 -
Views/modifies file attributes 1 TTPs 3 IoCs
pid Process 1728 attrib.exe 4208 attrib.exe 724 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c597a3de3db7b77b11beb33640dca13812dbc26cf291856810bd170039b17183N.exe"C:\Users\Admin\AppData\Local\Temp\c597a3de3db7b77b11beb33640dca13812dbc26cf291856810bd170039b17183N.exe"1⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Users\Admin\AppData\Local\Temp\Payload.exe"C:\Users\Admin\AppData\Local\Temp\Payload.exe"2⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Windows\SysWOW64\attrib.exeattrib +h +r +s "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.exe"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1728
-
-
C:\Windows\SysWOW64\attrib.exeattrib +h +r +s "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\Windows.exe"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:4208
-
-
-
C:\Windows\SysWOW64\attrib.exeattrib +h +r +s "C:\Users\Admin\AppData\Local\Temp\Payload.exe"2⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:724
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
27KB
MD53eaff8ce09f497995f5be4dc1b3aa820
SHA1f2b7c3546b6f55d2c797eeb2b8ed2a37e05e16e1
SHA256c597a3de3db7b77b11beb33640dca13812dbc26cf291856810bd170039b17183
SHA51241d223f11aa428a5e262783bf732ffabb967785c7f2a7299b259f1398bb64b4a1ab3478e7e11312268fd86ee824d0f7f33c2b1b1aa5a31754c168ca4d8a26b62
-
Filesize
1KB
MD5fb3265e9a00916c090c8e20631d780c9
SHA1b0f1735898631574ce674b72bf44dcad86bde9a8
SHA2569805ff89469df497f964431805b4d5dd5c1c56cba56146c47b8771d6379db255
SHA512c799bcb189d1f168a3ba5a2d3bcbd299edb7f467e17a404a8ded57333dc63f3f6271200e533fa8b8091ccedcdb9a42948a4a21697b1612883e77f8bceac0b56c
-
Filesize
1KB
MD58a4a77f365cf4c94e6fe4c57bf5a64db
SHA163414a5d1837faa0a2a1706ea8556c8107599516
SHA256daaf22e3564585771e9c7886c476966386fddd59a8a30a0ede906d6b5d531fdd
SHA512bb7bc82ee8549760e5243648cecec66b195ef35e837f6a675c3720525107f29cfa420b8057cf03d0c5203979bb3d864517cdb49ddfafd10cdf63e1c713dd0bd1