Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
92s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
04/02/2025, 20:50
Static task
static1
Behavioral task
behavioral1
Sample
3f53fdc377204be1d112c4a84c1299a4978c70e9744557cade8a371b7aa08aa4N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3f53fdc377204be1d112c4a84c1299a4978c70e9744557cade8a371b7aa08aa4N.exe
Resource
win10v2004-20250129-en
General
-
Target
3f53fdc377204be1d112c4a84c1299a4978c70e9744557cade8a371b7aa08aa4N.exe
-
Size
116KB
-
MD5
3abefcde2b20a36dcd3c79a672c3c160
-
SHA1
37b4d904dd0d876f3c86c02afd27f078e735f2d7
-
SHA256
3f53fdc377204be1d112c4a84c1299a4978c70e9744557cade8a371b7aa08aa4
-
SHA512
538e50f8d9dc6fdd2fba394fa47e730ef02b3e7602d93fc58373278d9211dfd4d6fedf5e1e7fd0762f220968a37a725953e5dd64f70e37fb4fcff7cf6712afcc
-
SSDEEP
1536:SgrbgkYur+eha3BzXSudZvIyEjG1fBclsc:SigkC3AuXvILjMBcKc
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000\Control Panel\International\Geo\Nation 3f53fdc377204be1d112c4a84c1299a4978c70e9744557cade8a371b7aa08aa4N.exe -
Executes dropped EXE 1 IoCs
pid Process 1988 WinHe805.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\WinHe805.exe 3f53fdc377204be1d112c4a84c1299a4978c70e9744557cade8a371b7aa08aa4N.exe File opened for modification C:\Windows\SysWOW64\WinHe805.exe 3f53fdc377204be1d112c4a84c1299a4978c70e9744557cade8a371b7aa08aa4N.exe File created C:\Windows\SysWOW64\WinHe805.exe WinHe805.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3f53fdc377204be1d112c4a84c1299a4978c70e9744557cade8a371b7aa08aa4N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WinHe805.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2896 3f53fdc377204be1d112c4a84c1299a4978c70e9744557cade8a371b7aa08aa4N.exe Token: SeIncBasePriorityPrivilege 1988 WinHe805.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2896 wrote to memory of 1988 2896 3f53fdc377204be1d112c4a84c1299a4978c70e9744557cade8a371b7aa08aa4N.exe 87 PID 2896 wrote to memory of 1988 2896 3f53fdc377204be1d112c4a84c1299a4978c70e9744557cade8a371b7aa08aa4N.exe 87 PID 2896 wrote to memory of 1988 2896 3f53fdc377204be1d112c4a84c1299a4978c70e9744557cade8a371b7aa08aa4N.exe 87 PID 2896 wrote to memory of 2536 2896 3f53fdc377204be1d112c4a84c1299a4978c70e9744557cade8a371b7aa08aa4N.exe 88 PID 2896 wrote to memory of 2536 2896 3f53fdc377204be1d112c4a84c1299a4978c70e9744557cade8a371b7aa08aa4N.exe 88 PID 2896 wrote to memory of 2536 2896 3f53fdc377204be1d112c4a84c1299a4978c70e9744557cade8a371b7aa08aa4N.exe 88 PID 1988 wrote to memory of 3044 1988 WinHe805.exe 89 PID 1988 wrote to memory of 3044 1988 WinHe805.exe 89 PID 1988 wrote to memory of 3044 1988 WinHe805.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f53fdc377204be1d112c4a84c1299a4978c70e9744557cade8a371b7aa08aa4N.exe"C:\Users\Admin\AppData\Local\Temp\3f53fdc377204be1d112c4a84c1299a4978c70e9744557cade8a371b7aa08aa4N.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\SysWOW64\WinHe805.exe"C:\Windows\system32\WinHe805.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C del C:\Windows\SysWOW64\WinHe805.exe > nul3⤵
- System Location Discovery: System Language Discovery
PID:3044
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C del C:\Users\Admin\AppData\Local\Temp\3F53FD~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:2536
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28.3MB
MD537b5e1e2e945d48a5907a0d75b4741fe
SHA13791faef45c3f5404442cba5e643b9c23ef1596e
SHA256225267f795c8c89164d9afc15479787a5dbb787ed167eadaabcf2a1c6ff58c48
SHA51237c9854c145d652e4e261b8da9508ef2883924cc1b94ab18443ab2ac2865c621416d6c52db88b19ef4dc7b944c5ad9885558c8f0e3673ed75252d8ea525a1063