Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/12/2024, 00:44
Static task
static1
Behavioral task
behavioral1
Sample
2727b2e1e5b6a3bc865fa11debdd95b07c661f4335c3465a82478fcab12062d2.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2727b2e1e5b6a3bc865fa11debdd95b07c661f4335c3465a82478fcab12062d2.exe
Resource
win10v2004-20241007-en
General
-
Target
2727b2e1e5b6a3bc865fa11debdd95b07c661f4335c3465a82478fcab12062d2.exe
-
Size
78KB
-
MD5
79fab37f08fc1e4cc0aeb2263a7bd6c2
-
SHA1
317efa5c6e28443a6bd79521cd2f433f1eab2666
-
SHA256
2727b2e1e5b6a3bc865fa11debdd95b07c661f4335c3465a82478fcab12062d2
-
SHA512
2f613351a2ca49e615fd1cf7837fb8fbefe4f371d2858f02e3ade853b01e19e293a47f9c95081574afd2311b5af4d2f2358e480ba01d8f927a4e460e4af97aa5
-
SSDEEP
1536:KmWV5jPvZv0kH9gDDtWzYCnJPeoYrGQtC67F9/W1BDZ:FWV5jPl0Y9MDYrm7jF9/WZ
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 2727b2e1e5b6a3bc865fa11debdd95b07c661f4335c3465a82478fcab12062d2.exe -
Executes dropped EXE 1 IoCs
pid Process 2940 tmpBAB5.tmp.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\peverify = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft.CSharp.exe\"" tmpBAB5.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2727b2e1e5b6a3bc865fa11debdd95b07c661f4335c3465a82478fcab12062d2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpBAB5.tmp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1568 2727b2e1e5b6a3bc865fa11debdd95b07c661f4335c3465a82478fcab12062d2.exe Token: SeDebugPrivilege 2940 tmpBAB5.tmp.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1568 wrote to memory of 1632 1568 2727b2e1e5b6a3bc865fa11debdd95b07c661f4335c3465a82478fcab12062d2.exe 83 PID 1568 wrote to memory of 1632 1568 2727b2e1e5b6a3bc865fa11debdd95b07c661f4335c3465a82478fcab12062d2.exe 83 PID 1568 wrote to memory of 1632 1568 2727b2e1e5b6a3bc865fa11debdd95b07c661f4335c3465a82478fcab12062d2.exe 83 PID 1632 wrote to memory of 3676 1632 vbc.exe 85 PID 1632 wrote to memory of 3676 1632 vbc.exe 85 PID 1632 wrote to memory of 3676 1632 vbc.exe 85 PID 1568 wrote to memory of 2940 1568 2727b2e1e5b6a3bc865fa11debdd95b07c661f4335c3465a82478fcab12062d2.exe 86 PID 1568 wrote to memory of 2940 1568 2727b2e1e5b6a3bc865fa11debdd95b07c661f4335c3465a82478fcab12062d2.exe 86 PID 1568 wrote to memory of 2940 1568 2727b2e1e5b6a3bc865fa11debdd95b07c661f4335c3465a82478fcab12062d2.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\2727b2e1e5b6a3bc865fa11debdd95b07c661f4335c3465a82478fcab12062d2.exe"C:\Users\Admin\AppData\Local\Temp\2727b2e1e5b6a3bc865fa11debdd95b07c661f4335c3465a82478fcab12062d2.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\ydh-0uvv.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESBBBE.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc3F90B90AA374429890B7D5F269AE9236.TMP"3⤵
- System Location Discovery: System Language Discovery
PID:3676
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmpBAB5.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpBAB5.tmp.exe" C:\Users\Admin\AppData\Local\Temp\2727b2e1e5b6a3bc865fa11debdd95b07c661f4335c3465a82478fcab12062d2.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2940
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57a6276d9a57c18a829f500859d699f78
SHA1da7508b52e63195cd5f68fc61b482f1984135631
SHA256affd5df6c40e864f0731b45d3b8f57b80bbc5dae047f7a7773599f8efb32dd83
SHA512fcf71050b40c02fa1ea0a7ac67fe33a0f3299d3f1899af17160c47e1bd84a8cec1676a2f40f11767d3133173f1345acae3f80ea12e5817db98cb7e5b12222119
-
Filesize
78KB
MD5cf41f1c399260da8529fd30cb108bf09
SHA191fa3587048670696ecca9b7cdb7a97a03773821
SHA256cccd6e7bc86db7ae3b72150f00c53ae0f0148f99736c50f0f638bf4c44b14787
SHA512a584adbc66189d38359ed4727efde51be56277328f400941a32b544d95fa41082483cb476d97961795abb9a1a94568f07481614764921ea0e0086bb84947f91b
-
Filesize
660B
MD5ec0401b28c950d990a844af507213ce5
SHA1959c5496ca9d97d01d03b6cbbc92839ab4f65ef7
SHA2563bc9dd577dc223c3cc829e0a7aaeca2f568c33b2ead743dffa2a5fa5e0d57025
SHA5125ef359c7d104a0ac28467816030ae67ec4457ceee2911545d84542a15121f11030e0789dabb93c2c27f7268bc6e931779478717d1511f848174a124170762fef
-
Filesize
14KB
MD5750a6932ef9455162d28050411ff7c2d
SHA1463ebea3e6687712a8b269db41ecd23f181ac53c
SHA2564e2653a5998b5d4fb0265228377485720c25fe09a16a4b1a6f1e7848d20c21c1
SHA51293f1de69e04cfb82b2ce8bfc2ebb1ff5690bf9e8bfc679b38b29885d783241744ea199d7b095fb3bfb93e5123ff12ba4a45ff3b455ab1881eb7a39503562e6da
-
Filesize
266B
MD561b43add80895db83428f44d3a31663e
SHA146f0af64fe4c0b7b7b23d6ae8633bfa0d449ea4a
SHA2561e81aa129788fb9fac99b239a087bf5d45f525e388ad6af53eb763505b71b853
SHA5129b4d44f00b1fb29f22c3045c1a63b7bb688ac77eaf88d70f044aab61751f2416ada37c98334bb77cdce475b176791901c233848701dc6480951b24301b8cb853
-
Filesize
62KB
MD58b25b4d931908b4c77ce6c3d5b9a2910
SHA188b65fd9733484c8f8147dad9d0896918c7e37c7
SHA25679c261ab6b394ee23ab0fd0af48bcd96f914c6bb88b36b6815b6bbf787ecd56e
SHA5126d954066cec5eca118601f2f848f5c9deebe3761ac285c6d45041df22e4bc4e9e2fd98c1aa4fbb6b9c735151bf8d5fffa5acddf7060a4cf3cb7e09271a4a926d