Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    116s
  • max time network
    135s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/03/2025, 06:12

General

  • Target

    6c17f80a5a74741689d6145a1e7dca2a7ba13e52fab6e37e2c3240bb47ac7133.exe

  • Size

    418KB

  • MD5

    552b5d6980369b3c7b29fc25cd763251

  • SHA1

    4743845b971bb5003d6f30741f61171243ff5c75

  • SHA256

    6c17f80a5a74741689d6145a1e7dca2a7ba13e52fab6e37e2c3240bb47ac7133

  • SHA512

    22fcaa454e979ff01b979d8d3845d0bb771615313a9fbc3cc062a332c9743b00bdba977dc6ddd247a0832a62fe0bc4ec064f0b68a6d9713751e2eb6688263710

  • SSDEEP

    6144:ITNE3ZRrnaBVlvphVxmP+6CiejgcME1cwYfU+va+RUwbvk:ITNYrnE3bm/CiejewY5vX8

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6c17f80a5a74741689d6145a1e7dca2a7ba13e52fab6e37e2c3240bb47ac7133.exe
    "C:\Users\Admin\AppData\Local\Temp\6c17f80a5a74741689d6145a1e7dca2a7ba13e52fab6e37e2c3240bb47ac7133.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:5900
    • C:\Users\Admin\AppData\Roaming\c5e4gxfvd4v\ximo2ubzn1i.exe
      "C:\Users\Admin\AppData\Roaming\c5e4gxfvd4v\ximo2ubzn1i.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4768
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
        3⤵
          PID:4720

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\c5e4gxfvd4v\ximo2ubzn1i.exe

      Filesize

      418KB

      MD5

      b32e8ea43d401d3f96df84d6bc208415

      SHA1

      4071d07deb9123e87f861dd515b49a8ebb661292

      SHA256

      d5ed8f41277e484e49c42b30778c689e87c67d1f490339ea2411f9e23a1a2c5f

      SHA512

      ac58fd8426008454d2e5198097f7820cf425b6f59ad466c889f226b7857b30355e9de8d0887469bc8bdc919eed581b5fdb5171ad4acf895600373d5656f71c8b

    • memory/4768-25-0x0000000074D70000-0x0000000075520000-memory.dmp

      Filesize

      7.7MB

    • memory/4768-23-0x0000000074D70000-0x0000000075520000-memory.dmp

      Filesize

      7.7MB

    • memory/4768-22-0x0000000074D70000-0x0000000075520000-memory.dmp

      Filesize

      7.7MB

    • memory/4768-21-0x0000000074D70000-0x0000000075520000-memory.dmp

      Filesize

      7.7MB

    • memory/5900-3-0x00000000055B0000-0x0000000005642000-memory.dmp

      Filesize

      584KB

    • memory/5900-6-0x0000000005970000-0x00000000059AC000-memory.dmp

      Filesize

      240KB

    • memory/5900-5-0x0000000074D70000-0x0000000075520000-memory.dmp

      Filesize

      7.7MB

    • memory/5900-20-0x0000000074D70000-0x0000000075520000-memory.dmp

      Filesize

      7.7MB

    • memory/5900-4-0x0000000005780000-0x000000000578A000-memory.dmp

      Filesize

      40KB

    • memory/5900-0-0x0000000074D7E000-0x0000000074D7F000-memory.dmp

      Filesize

      4KB

    • memory/5900-2-0x0000000005A60000-0x0000000006004000-memory.dmp

      Filesize

      5.6MB

    • memory/5900-1-0x0000000000B70000-0x0000000000BDE000-memory.dmp

      Filesize

      440KB