Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/03/2025, 11:26

General

  • Target

    1e58a8ce848fae7ac2a8d4fcd87cdd6d895024cf15dc2499f2aafe9717011a36.exe

  • Size

    80KB

  • MD5

    42074dc519066af487b4b9440ce42a30

  • SHA1

    5a85a4120edd7de87665b8fe6457e69f2c1c15f8

  • SHA256

    1e58a8ce848fae7ac2a8d4fcd87cdd6d895024cf15dc2499f2aafe9717011a36

  • SHA512

    701b82e3b6be9a32bf160f70b31bd47213a3ef91b4dd3e4d48f42a8c0186eb25c33b351d9c3c1529dc53182d63215293d4c3788a8a796617c6bf66bd16077a3b

  • SSDEEP

    1536:45coBuVU67gccYy53JDAAZpW4oYkguWe3i6E27:OBQU67h7

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 27 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1e58a8ce848fae7ac2a8d4fcd87cdd6d895024cf15dc2499f2aafe9717011a36.exe
    "C:\Users\Admin\AppData\Local\Temp\1e58a8ce848fae7ac2a8d4fcd87cdd6d895024cf15dc2499f2aafe9717011a36.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4360
    • C:\Users\Admin\boijeij.exe
      "C:\Users\Admin\boijeij.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1268

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\boijeij.exe

    Filesize

    80KB

    MD5

    988a326432c4a464d7b75b546603e31a

    SHA1

    1320004c5f2bd4b5539a9c4d8bc91654849d7374

    SHA256

    4c6038ee41e22d032ff0024c734a9053d9a8c8b9b37310588921dbc6ada01f2c

    SHA512

    31f9460730b36f299c3b5bfd298dee34dcc2a5ee5a1ecd1f29c994a0e414c9da83dbd047e9660b656305e6496fc960de379245ad6e8a955dc03b68c280fa187a