Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
22/03/2025, 20:48
Behavioral task
behavioral1
Sample
f477d38438427882a0ed121221ca070c9129cd9e3ebe63ec090896da59580ff9.exe
Resource
win7-20241010-en
General
-
Target
f477d38438427882a0ed121221ca070c9129cd9e3ebe63ec090896da59580ff9.exe
-
Size
350KB
-
MD5
f7442352f7cdd82539cbe34770c23bdd
-
SHA1
0eae8098ff5d50573b9be9328dc1e3fb4e255aa6
-
SHA256
f477d38438427882a0ed121221ca070c9129cd9e3ebe63ec090896da59580ff9
-
SHA512
cfc025199fc9faa82c6dd8a1ddb0d80b63c28ed059992dbf1ece788aca1775cf4d2d5d73eb1cf9d0a1d12a64c3a911f725a74ba6caa81399806a2d5a68141c18
-
SSDEEP
6144:/90LamoFY2ari9ghin3SyTIMuxQlw/f/bmSGFol:/GLammY2aoKcSyMbxQlw/f/bZG+l
Malware Config
Extracted
qqpass
http://cf.qq.com/act/a20141214luxury/?ADTAG=client.btn.detail
-
url
http://i3.tietuku.com/801db876cdcaa96c.png
-
user_agent
Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1; 125LA; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022)
Signatures
-
Qqpass family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Control Panel\International\Geo\Nation f477d38438427882a0ed121221ca070c9129cd9e3ebe63ec090896da59580ff9.exe -
Executes dropped EXE 1 IoCs
pid Process 4504 Sysceameutih.exe -
resource yara_rule behavioral2/memory/4388-0-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/files/0x000b000000024097-10.dat upx behavioral2/memory/4388-41-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/4504-42-0x0000000000400000-0x000000000045B000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f477d38438427882a0ed121221ca070c9129cd9e3ebe63ec090896da59580ff9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysceameutih.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ f477d38438427882a0ed121221ca070c9129cd9e3ebe63ec090896da59580ff9.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4504 Sysceameutih.exe 4504 Sysceameutih.exe 4504 Sysceameutih.exe 4504 Sysceameutih.exe 4504 Sysceameutih.exe 4504 Sysceameutih.exe 4504 Sysceameutih.exe 4504 Sysceameutih.exe 4504 Sysceameutih.exe 4504 Sysceameutih.exe 4504 Sysceameutih.exe 4504 Sysceameutih.exe 4504 Sysceameutih.exe 4504 Sysceameutih.exe 4504 Sysceameutih.exe 4504 Sysceameutih.exe 4504 Sysceameutih.exe 4504 Sysceameutih.exe 4504 Sysceameutih.exe 4504 Sysceameutih.exe 4504 Sysceameutih.exe 4504 Sysceameutih.exe 4504 Sysceameutih.exe 4504 Sysceameutih.exe 4504 Sysceameutih.exe 4504 Sysceameutih.exe 4504 Sysceameutih.exe 4504 Sysceameutih.exe 4504 Sysceameutih.exe 4504 Sysceameutih.exe 4504 Sysceameutih.exe 4504 Sysceameutih.exe 4504 Sysceameutih.exe 4504 Sysceameutih.exe 4504 Sysceameutih.exe 4504 Sysceameutih.exe 4504 Sysceameutih.exe 4504 Sysceameutih.exe 4504 Sysceameutih.exe 4504 Sysceameutih.exe 4504 Sysceameutih.exe 4504 Sysceameutih.exe 4504 Sysceameutih.exe 4504 Sysceameutih.exe 4504 Sysceameutih.exe 4504 Sysceameutih.exe 4504 Sysceameutih.exe 4504 Sysceameutih.exe 4504 Sysceameutih.exe 4504 Sysceameutih.exe 4504 Sysceameutih.exe 4504 Sysceameutih.exe 4504 Sysceameutih.exe 4504 Sysceameutih.exe 4504 Sysceameutih.exe 4504 Sysceameutih.exe 4504 Sysceameutih.exe 4504 Sysceameutih.exe 4504 Sysceameutih.exe 4504 Sysceameutih.exe 4504 Sysceameutih.exe 4504 Sysceameutih.exe 4504 Sysceameutih.exe 4504 Sysceameutih.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4388 wrote to memory of 4504 4388 f477d38438427882a0ed121221ca070c9129cd9e3ebe63ec090896da59580ff9.exe 88 PID 4388 wrote to memory of 4504 4388 f477d38438427882a0ed121221ca070c9129cd9e3ebe63ec090896da59580ff9.exe 88 PID 4388 wrote to memory of 4504 4388 f477d38438427882a0ed121221ca070c9129cd9e3ebe63ec090896da59580ff9.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\f477d38438427882a0ed121221ca070c9129cd9e3ebe63ec090896da59580ff9.exe"C:\Users\Admin\AppData\Local\Temp\f477d38438427882a0ed121221ca070c9129cd9e3ebe63ec090896da59580ff9.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Users\Admin\AppData\Local\Temp\Sysceameutih.exe"C:\Users\Admin\AppData\Local\Temp\Sysceameutih.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4504
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
350KB
MD57ab25fef56ff55338cf009127f0812fc
SHA15002354691e3dbc9e7ed9218c2141c025b3fcb14
SHA25649ca531e1188f7ca9f4680841f6913e96610dc2725eeb6a06fd9f550162a010c
SHA5124e513cba669643fb5157c33938af97ddba48c883d566cb829d456d30eb05af338361aa1822d4edf71259245d8bbf707b3d9458d17c7a7b83027b46cb22332fb1
-
Filesize
102B
MD5b17711e9c214d3a6cfa8f54239125348
SHA1e8327bd11a0c30cac4108992cb4c1702df79c489
SHA2560033a317c006fb6c7267521bf75bb2e73b6019b9673cfee51f37b8e22a74458c
SHA512bcd320899aac9ad8fa866a8650e4cb1e0307632254eeb0ba60d6482c77b94f1d0018fb163ede81f8255360723a04cb8d012827c87f38a7b27ceaa076ff69c162