Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
94s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27/01/2025, 01:49
Static task
static1
Behavioral task
behavioral1
Sample
46f92ebe290305fbfa65465b24f2c058c3ad05ec6e0858345d00d407efbe1994.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
46f92ebe290305fbfa65465b24f2c058c3ad05ec6e0858345d00d407efbe1994.exe
Resource
win10v2004-20241007-en
General
-
Target
46f92ebe290305fbfa65465b24f2c058c3ad05ec6e0858345d00d407efbe1994.exe
-
Size
416KB
-
MD5
d8fdfbfd5c63977d3a802fe8b185a61f
-
SHA1
dcab16d4ee8909794148c357abf2ab45d6d17fff
-
SHA256
46f92ebe290305fbfa65465b24f2c058c3ad05ec6e0858345d00d407efbe1994
-
SHA512
0e5ffec28eb71314504a30c8d7c7bbb68a0b7aa79f0181360f9f9f99db434bdc27e581e893ff8b7da7bfbeb700a131f11b3651709655564011580df04ca261e8
-
SSDEEP
6144:ITNE3ZRrnaBVlvphVxmP+6CiejgcME1cwYfU+va+RU2:ITNYrnE3bm/CiejewY5vX
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 46f92ebe290305fbfa65465b24f2c058c3ad05ec6e0858345d00d407efbe1994.exe -
Executes dropped EXE 1 IoCs
pid Process 3504 ximo2ubzn1i.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\c5e4gxfvd4v = "C:\\Users\\Admin\\AppData\\Roaming\\c5e4gxfvd4v\\ximo2ubzn1i.exe" 46f92ebe290305fbfa65465b24f2c058c3ad05ec6e0858345d00d407efbe1994.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 46f92ebe290305fbfa65465b24f2c058c3ad05ec6e0858345d00d407efbe1994.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ximo2ubzn1i.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2596 wrote to memory of 3504 2596 46f92ebe290305fbfa65465b24f2c058c3ad05ec6e0858345d00d407efbe1994.exe 84 PID 2596 wrote to memory of 3504 2596 46f92ebe290305fbfa65465b24f2c058c3ad05ec6e0858345d00d407efbe1994.exe 84 PID 2596 wrote to memory of 3504 2596 46f92ebe290305fbfa65465b24f2c058c3ad05ec6e0858345d00d407efbe1994.exe 84 PID 3504 wrote to memory of 4936 3504 ximo2ubzn1i.exe 85 PID 3504 wrote to memory of 4936 3504 ximo2ubzn1i.exe 85 PID 3504 wrote to memory of 4936 3504 ximo2ubzn1i.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\46f92ebe290305fbfa65465b24f2c058c3ad05ec6e0858345d00d407efbe1994.exe"C:\Users\Admin\AppData\Local\Temp\46f92ebe290305fbfa65465b24f2c058c3ad05ec6e0858345d00d407efbe1994.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Users\Admin\AppData\Roaming\c5e4gxfvd4v\ximo2ubzn1i.exe"C:\Users\Admin\AppData\Roaming\c5e4gxfvd4v\ximo2ubzn1i.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"3⤵PID:4936
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
416KB
MD59323d0d485a83a1ea7ee63932ef56322
SHA1d97f24c2c98c7deba08b6ea5707d84022ec3dca3
SHA256009a298be874cc883107343764ffc3a511d1640445dc96b284937057172174f7
SHA512a9c901eedf40040b43e68a17bea6a8eaa0dd2199b305845ac0e26e6a0f6deb8b855e7b901924af2d01f423e4851cd55f06d07a8d15add26df1d692eb790fe9e7