Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
13/09/2022, 11:25
Static task
static1
Behavioral task
behavioral1
Sample
5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5.exe
Resource
win10v2004-20220812-en
General
-
Target
5.exe
-
Size
722KB
-
MD5
fe0194467e3ecfecf01cec42ce795e44
-
SHA1
17b93e4dd17d4d83b28c7eb42591813084066ae1
-
SHA256
6d64ccd1e87189818fd18725919496b4a8a8f1d561c9eddd876a07a684d86e23
-
SHA512
a32603d19e33f1c998fe5cbec177e20f150ff2db69f1caee157e2ca206b151bdbfb4abd8ea06853797354b136f3b5746c822303046f2e3b6bdfef1d4892fdcba
-
SSDEEP
12288:TYtiUtSIfqvYBSqlA8gDR3lRsvBwrWbKACaJD8gFh1:GiUtPqABSqijDFMBwar4gFh1
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4596 Inw)9876567849-4976456478.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dfghjhgfddfghjhg = "C:\\Users\\Admin\\Documents\\Inw)9876567849-4976456478.exe" reg.exe -
Runs ping.exe 1 TTPs 3 IoCs
pid Process 1416 PING.EXE 4600 PING.EXE 2332 PING.EXE -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 4796 5.exe 4796 5.exe 4796 5.exe 4796 5.exe 4796 5.exe 4796 5.exe 4796 5.exe 4796 5.exe 4796 5.exe 4796 5.exe 4796 5.exe 4796 5.exe 4796 5.exe 4796 5.exe 4796 5.exe 4796 5.exe 4796 5.exe 4796 5.exe 4796 5.exe 4796 5.exe 4796 5.exe 4796 5.exe 4796 5.exe 4596 Inw)9876567849-4976456478.exe 4596 Inw)9876567849-4976456478.exe 4596 Inw)9876567849-4976456478.exe 4596 Inw)9876567849-4976456478.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4796 5.exe Token: SeDebugPrivilege 4596 Inw)9876567849-4976456478.exe -
Suspicious use of WriteProcessMemory 37 IoCs
description pid Process procid_target PID 4796 wrote to memory of 356 4796 5.exe 87 PID 4796 wrote to memory of 356 4796 5.exe 87 PID 4796 wrote to memory of 356 4796 5.exe 87 PID 356 wrote to memory of 1416 356 cmd.exe 89 PID 356 wrote to memory of 1416 356 cmd.exe 89 PID 356 wrote to memory of 1416 356 cmd.exe 89 PID 4796 wrote to memory of 852 4796 5.exe 100 PID 4796 wrote to memory of 852 4796 5.exe 100 PID 4796 wrote to memory of 852 4796 5.exe 100 PID 852 wrote to memory of 4600 852 cmd.exe 102 PID 852 wrote to memory of 4600 852 cmd.exe 102 PID 852 wrote to memory of 4600 852 cmd.exe 102 PID 356 wrote to memory of 1872 356 cmd.exe 110 PID 356 wrote to memory of 1872 356 cmd.exe 110 PID 356 wrote to memory of 1872 356 cmd.exe 110 PID 852 wrote to memory of 2332 852 cmd.exe 111 PID 852 wrote to memory of 2332 852 cmd.exe 111 PID 852 wrote to memory of 2332 852 cmd.exe 111 PID 852 wrote to memory of 4596 852 cmd.exe 113 PID 852 wrote to memory of 4596 852 cmd.exe 113 PID 852 wrote to memory of 4596 852 cmd.exe 113 PID 4596 wrote to memory of 4104 4596 Inw)9876567849-4976456478.exe 114 PID 4596 wrote to memory of 4104 4596 Inw)9876567849-4976456478.exe 114 PID 4596 wrote to memory of 4104 4596 Inw)9876567849-4976456478.exe 114 PID 4596 wrote to memory of 4104 4596 Inw)9876567849-4976456478.exe 114 PID 4596 wrote to memory of 4104 4596 Inw)9876567849-4976456478.exe 114 PID 4596 wrote to memory of 4104 4596 Inw)9876567849-4976456478.exe 114 PID 4596 wrote to memory of 4104 4596 Inw)9876567849-4976456478.exe 114 PID 4596 wrote to memory of 4104 4596 Inw)9876567849-4976456478.exe 114 PID 4596 wrote to memory of 1392 4596 Inw)9876567849-4976456478.exe 115 PID 4596 wrote to memory of 1392 4596 Inw)9876567849-4976456478.exe 115 PID 4596 wrote to memory of 1392 4596 Inw)9876567849-4976456478.exe 115 PID 4596 wrote to memory of 1392 4596 Inw)9876567849-4976456478.exe 115 PID 4596 wrote to memory of 1392 4596 Inw)9876567849-4976456478.exe 115 PID 4596 wrote to memory of 1392 4596 Inw)9876567849-4976456478.exe 115 PID 4596 wrote to memory of 1392 4596 Inw)9876567849-4976456478.exe 115 PID 4596 wrote to memory of 1392 4596 Inw)9876567849-4976456478.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\5.exe"C:\Users\Admin\AppData\Local\Temp\5.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c ping 127.0.0.1 -n 39 > nul && REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "dfghjhgfddfghjhg" /t REG_SZ /d "C:\Users\Admin\Documents\Inw)9876567849-4976456478.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:356 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 393⤵
- Runs ping.exe
PID:1416
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "dfghjhgfddfghjhg" /t REG_SZ /d "C:\Users\Admin\Documents\Inw)9876567849-4976456478.exe"3⤵
- Adds Run key to start application
PID:1872
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c ping 127.0.0.1 -n 39 > nul && copy "C:\Users\Admin\AppData\Local\Temp\5.exe" "C:\Users\Admin\Documents\Inw)9876567849-4976456478.exe" && ping 127.0.0.1 -n 39 > nul && "C:\Users\Admin\Documents\Inw)9876567849-4976456478.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 393⤵
- Runs ping.exe
PID:4600
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 393⤵
- Runs ping.exe
PID:2332
-
-
C:\Users\Admin\Documents\Inw)9876567849-4976456478.exe"C:\Users\Admin\Documents\Inw)9876567849-4976456478.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"4⤵PID:4104
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"4⤵PID:1392
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
722KB
MD5fe0194467e3ecfecf01cec42ce795e44
SHA117b93e4dd17d4d83b28c7eb42591813084066ae1
SHA2566d64ccd1e87189818fd18725919496b4a8a8f1d561c9eddd876a07a684d86e23
SHA512a32603d19e33f1c998fe5cbec177e20f150ff2db69f1caee157e2ca206b151bdbfb4abd8ea06853797354b136f3b5746c822303046f2e3b6bdfef1d4892fdcba
-
Filesize
722KB
MD5fe0194467e3ecfecf01cec42ce795e44
SHA117b93e4dd17d4d83b28c7eb42591813084066ae1
SHA2566d64ccd1e87189818fd18725919496b4a8a8f1d561c9eddd876a07a684d86e23
SHA512a32603d19e33f1c998fe5cbec177e20f150ff2db69f1caee157e2ca206b151bdbfb4abd8ea06853797354b136f3b5746c822303046f2e3b6bdfef1d4892fdcba