Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    134s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/03/2025, 06:18

General

  • Target

    f2259737b967bbe88fc74916f319c61a.exe

  • Size

    914KB

  • MD5

    f2259737b967bbe88fc74916f319c61a

  • SHA1

    d4aa76d4aeaebb6db93b4131c81fc898cb48f901

  • SHA256

    b4dc13b87fda606c84b1ac2e9a3ae2d16f24aa5ff389b6cb0f550dd517986cba

  • SHA512

    560b28ea6b8d8b67f0a0707f819204d8b4f49614d668ab2a367acc67fb437562c8163cb4b6ccb70186945f58d788b0d1e5e44d0e238f96b03e70ad245c1f70d0

  • SSDEEP

    24576:CdtP2cbksTpugRNJI5kFMJF9OWjwjLOjZV:fgq7

Malware Config

Signatures

  • NanoCore

    NanoCore is a remote access tool (RAT) with a variety of capabilities.

  • Nanocore family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 15 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f2259737b967bbe88fc74916f319c61a.exe
    "C:\Users\Admin\AppData\Local\Temp\f2259737b967bbe88fc74916f319c61a.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:5484
    • C:\Users\Admin\AppData\Roaming\app.exe
      "C:\Users\Admin\AppData\Roaming\app.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:5480
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\aspnet_compiler.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\aspnet_compiler.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3544
        • C:\Windows\SysWOW64\schtasks.exe
          "schtasks.exe" /create /f /tn "SMTP Subsystem" /xml "C:\Users\Admin\AppData\Local\Temp\tmpCF13.tmp"
          4⤵
          • System Location Discovery: System Language Discovery
          • Scheduled Task/Job: Scheduled Task
          PID:4912

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmpCF13.tmp

    Filesize

    1KB

    MD5

    d81eb43d26d4511c44151cba2eb45983

    SHA1

    135c98e039c6ab35d4e9564f15f9c56dc9dbeb9a

    SHA256

    a72a8f6434d6b0fb904db5adc8cab891d12c53b4ac1435dfd13df51f84a2d4d0

    SHA512

    b5895c19159d23a8fa312967e47d0855ac6f8f314f8931f54469b0c0079a22e9e00a5eaf6729761f74d54e111454d49813e658243e920a9c3434a5576cdda721

  • C:\Users\Admin\AppData\Roaming\app.exe

    Filesize

    923KB

    MD5

    03fec9db45b4e2b6bd119629c62afeed

    SHA1

    f9e3d4f4c5142b8e9e62d876fb1d75022059936e

    SHA256

    f27c4963784ed1d311afd03bdfbe000f499b67edd16c4af85d34e547b892ca29

    SHA512

    f30c2d7bb2201b9f78c5c23bcad35a04bad30a23b32e8bba006b9fb4ac453476d303109802c5799d60c813d7e942f3f38f336075d9709af0c02daadf8762cd7c

  • memory/3544-40-0x0000000075150000-0x0000000075701000-memory.dmp

    Filesize

    5.7MB

  • memory/3544-49-0x0000000075150000-0x0000000075701000-memory.dmp

    Filesize

    5.7MB

  • memory/3544-48-0x0000000075150000-0x0000000075701000-memory.dmp

    Filesize

    5.7MB

  • memory/3544-47-0x0000000075150000-0x0000000075701000-memory.dmp

    Filesize

    5.7MB

  • memory/3544-39-0x0000000075150000-0x0000000075701000-memory.dmp

    Filesize

    5.7MB

  • memory/3544-41-0x0000000075150000-0x0000000075701000-memory.dmp

    Filesize

    5.7MB

  • memory/5480-31-0x0000000075150000-0x0000000075701000-memory.dmp

    Filesize

    5.7MB

  • memory/5480-32-0x0000000075150000-0x0000000075701000-memory.dmp

    Filesize

    5.7MB

  • memory/5480-43-0x0000000075150000-0x0000000075701000-memory.dmp

    Filesize

    5.7MB

  • memory/5480-34-0x0000000075150000-0x0000000075701000-memory.dmp

    Filesize

    5.7MB

  • memory/5480-33-0x0000000075150000-0x0000000075701000-memory.dmp

    Filesize

    5.7MB

  • memory/5480-35-0x0000000075150000-0x0000000075701000-memory.dmp

    Filesize

    5.7MB

  • memory/5484-8-0x0000000075150000-0x0000000075701000-memory.dmp

    Filesize

    5.7MB

  • memory/5484-30-0x0000000075150000-0x0000000075701000-memory.dmp

    Filesize

    5.7MB

  • memory/5484-7-0x0000000075152000-0x0000000075153000-memory.dmp

    Filesize

    4KB

  • memory/5484-0-0x0000000075152000-0x0000000075153000-memory.dmp

    Filesize

    4KB

  • memory/5484-6-0x0000000075150000-0x0000000075701000-memory.dmp

    Filesize

    5.7MB

  • memory/5484-5-0x0000000075150000-0x0000000075701000-memory.dmp

    Filesize

    5.7MB

  • memory/5484-2-0x0000000075150000-0x0000000075701000-memory.dmp

    Filesize

    5.7MB

  • memory/5484-1-0x0000000075150000-0x0000000075701000-memory.dmp

    Filesize

    5.7MB