Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    94s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/01/2025, 01:49

General

  • Target

    46f92ebe290305fbfa65465b24f2c058c3ad05ec6e0858345d00d407efbe1994.exe

  • Size

    416KB

  • MD5

    d8fdfbfd5c63977d3a802fe8b185a61f

  • SHA1

    dcab16d4ee8909794148c357abf2ab45d6d17fff

  • SHA256

    46f92ebe290305fbfa65465b24f2c058c3ad05ec6e0858345d00d407efbe1994

  • SHA512

    0e5ffec28eb71314504a30c8d7c7bbb68a0b7aa79f0181360f9f9f99db434bdc27e581e893ff8b7da7bfbeb700a131f11b3651709655564011580df04ca261e8

  • SSDEEP

    6144:ITNE3ZRrnaBVlvphVxmP+6CiejgcME1cwYfU+va+RU2:ITNYrnE3bm/CiejewY5vX

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\46f92ebe290305fbfa65465b24f2c058c3ad05ec6e0858345d00d407efbe1994.exe
    "C:\Users\Admin\AppData\Local\Temp\46f92ebe290305fbfa65465b24f2c058c3ad05ec6e0858345d00d407efbe1994.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2596
    • C:\Users\Admin\AppData\Roaming\c5e4gxfvd4v\ximo2ubzn1i.exe
      "C:\Users\Admin\AppData\Roaming\c5e4gxfvd4v\ximo2ubzn1i.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3504
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
        3⤵
          PID:4936

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\c5e4gxfvd4v\ximo2ubzn1i.exe

      Filesize

      416KB

      MD5

      9323d0d485a83a1ea7ee63932ef56322

      SHA1

      d97f24c2c98c7deba08b6ea5707d84022ec3dca3

      SHA256

      009a298be874cc883107343764ffc3a511d1640445dc96b284937057172174f7

      SHA512

      a9c901eedf40040b43e68a17bea6a8eaa0dd2199b305845ac0e26e6a0f6deb8b855e7b901924af2d01f423e4851cd55f06d07a8d15add26df1d692eb790fe9e7

    • memory/2596-6-0x0000000004F10000-0x0000000004F4C000-memory.dmp

      Filesize

      240KB

    • memory/2596-2-0x0000000005280000-0x0000000005824000-memory.dmp

      Filesize

      5.6MB

    • memory/2596-3-0x0000000004CD0000-0x0000000004D62000-memory.dmp

      Filesize

      584KB

    • memory/2596-4-0x0000000004C80000-0x0000000004C8A000-memory.dmp

      Filesize

      40KB

    • memory/2596-5-0x0000000074BD0000-0x0000000075380000-memory.dmp

      Filesize

      7.7MB

    • memory/2596-0-0x0000000074BDE000-0x0000000074BDF000-memory.dmp

      Filesize

      4KB

    • memory/2596-1-0x0000000000350000-0x00000000003BE000-memory.dmp

      Filesize

      440KB

    • memory/2596-20-0x0000000074BD0000-0x0000000075380000-memory.dmp

      Filesize

      7.7MB

    • memory/3504-21-0x0000000074BD0000-0x0000000075380000-memory.dmp

      Filesize

      7.7MB

    • memory/3504-22-0x0000000074BD0000-0x0000000075380000-memory.dmp

      Filesize

      7.7MB

    • memory/3504-23-0x0000000074BD0000-0x0000000075380000-memory.dmp

      Filesize

      7.7MB

    • memory/3504-25-0x0000000074BD0000-0x0000000075380000-memory.dmp

      Filesize

      7.7MB