Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
168s -
max time network
182s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2022, 09:57
Static task
static1
Behavioral task
behavioral1
Sample
cb6c310fa55c87be0265292a56cb109b870cb612555d435aa71c3bfc78174196.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cb6c310fa55c87be0265292a56cb109b870cb612555d435aa71c3bfc78174196.exe
Resource
win10v2004-20220812-en
General
-
Target
cb6c310fa55c87be0265292a56cb109b870cb612555d435aa71c3bfc78174196.exe
-
Size
121KB
-
MD5
8b5ce176105c5e9189a080dae6ef906e
-
SHA1
211c58f6dbf0d5d14e9f560353d4b3ef03f0b705
-
SHA256
cb6c310fa55c87be0265292a56cb109b870cb612555d435aa71c3bfc78174196
-
SHA512
2e428f5b96c1f27bfb3c908e3f6498708174efe54a2fb3603fb298e706c0d2ab1f1e6c0a9c6355290b211898f23f0fdd9eae9090f4aa11687081fc79f8c1d5b7
-
SSDEEP
3072:xnj9jtfU+INndIc0J25lzn90Z3cWCWCV6PZR7olFV4mV7lMdGQY:xjbeiA9rWfCV6PZqFV4u7Kds
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 4916 111.exe 4488 111.exe 2200 111.exe 3372 111.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce cb6c310fa55c87be0265292a56cb109b870cb612555d435aa71c3bfc78174196.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" cb6c310fa55c87be0265292a56cb109b870cb612555d435aa71c3bfc78174196.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4916 set thread context of 4488 4916 111.exe 81 PID 2200 set thread context of 3372 2200 111.exe 83 -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4488 111.exe 4488 111.exe 4488 111.exe 4488 111.exe 3372 111.exe 3372 111.exe 3372 111.exe 3372 111.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4916 111.exe 2200 111.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 3796 wrote to memory of 4916 3796 cb6c310fa55c87be0265292a56cb109b870cb612555d435aa71c3bfc78174196.exe 80 PID 3796 wrote to memory of 4916 3796 cb6c310fa55c87be0265292a56cb109b870cb612555d435aa71c3bfc78174196.exe 80 PID 3796 wrote to memory of 4916 3796 cb6c310fa55c87be0265292a56cb109b870cb612555d435aa71c3bfc78174196.exe 80 PID 4916 wrote to memory of 4488 4916 111.exe 81 PID 4916 wrote to memory of 4488 4916 111.exe 81 PID 4916 wrote to memory of 4488 4916 111.exe 81 PID 4916 wrote to memory of 4488 4916 111.exe 81 PID 4916 wrote to memory of 4488 4916 111.exe 81 PID 4916 wrote to memory of 4488 4916 111.exe 81 PID 4916 wrote to memory of 4488 4916 111.exe 81 PID 3796 wrote to memory of 2200 3796 cb6c310fa55c87be0265292a56cb109b870cb612555d435aa71c3bfc78174196.exe 82 PID 3796 wrote to memory of 2200 3796 cb6c310fa55c87be0265292a56cb109b870cb612555d435aa71c3bfc78174196.exe 82 PID 3796 wrote to memory of 2200 3796 cb6c310fa55c87be0265292a56cb109b870cb612555d435aa71c3bfc78174196.exe 82 PID 2200 wrote to memory of 3372 2200 111.exe 83 PID 2200 wrote to memory of 3372 2200 111.exe 83 PID 2200 wrote to memory of 3372 2200 111.exe 83 PID 2200 wrote to memory of 3372 2200 111.exe 83 PID 2200 wrote to memory of 3372 2200 111.exe 83 PID 2200 wrote to memory of 3372 2200 111.exe 83 PID 2200 wrote to memory of 3372 2200 111.exe 83 PID 4488 wrote to memory of 2180 4488 111.exe 33 PID 4488 wrote to memory of 2180 4488 111.exe 33 PID 4488 wrote to memory of 2180 4488 111.exe 33 PID 3372 wrote to memory of 2180 3372 111.exe 33 PID 4488 wrote to memory of 2180 4488 111.exe 33 PID 3372 wrote to memory of 2180 3372 111.exe 33 PID 3372 wrote to memory of 2180 3372 111.exe 33 PID 3372 wrote to memory of 2180 3372 111.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:2180
-
C:\Users\Admin\AppData\Local\Temp\cb6c310fa55c87be0265292a56cb109b870cb612555d435aa71c3bfc78174196.exe"C:\Users\Admin\AppData\Local\Temp\cb6c310fa55c87be0265292a56cb109b870cb612555d435aa71c3bfc78174196.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\111.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\111.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\111.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\111.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4488
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\111.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\111.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\111.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\111.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3372
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
124KB
MD5fe6b0190806dbe8fbbcf5134f21fb7d6
SHA19b0b25c4a0a4b4a25ececaa42324ec1257b19ca7
SHA2560c395d52d5871c233dbe449d7b5edb69ee31303965bda64fab6969f3fbbd87a5
SHA5121851a9ecb6f003c6800648e0d0e0cd814e39da83e0dc855f6c03186ce9748bc654b185578abd984b7f9aeed1aa8c3f78d66a3c8c0acc92f9fee11d81d6c5d59f
-
Filesize
124KB
MD5fe6b0190806dbe8fbbcf5134f21fb7d6
SHA19b0b25c4a0a4b4a25ececaa42324ec1257b19ca7
SHA2560c395d52d5871c233dbe449d7b5edb69ee31303965bda64fab6969f3fbbd87a5
SHA5121851a9ecb6f003c6800648e0d0e0cd814e39da83e0dc855f6c03186ce9748bc654b185578abd984b7f9aeed1aa8c3f78d66a3c8c0acc92f9fee11d81d6c5d59f
-
Filesize
124KB
MD5fe6b0190806dbe8fbbcf5134f21fb7d6
SHA19b0b25c4a0a4b4a25ececaa42324ec1257b19ca7
SHA2560c395d52d5871c233dbe449d7b5edb69ee31303965bda64fab6969f3fbbd87a5
SHA5121851a9ecb6f003c6800648e0d0e0cd814e39da83e0dc855f6c03186ce9748bc654b185578abd984b7f9aeed1aa8c3f78d66a3c8c0acc92f9fee11d81d6c5d59f
-
Filesize
124KB
MD5fe6b0190806dbe8fbbcf5134f21fb7d6
SHA19b0b25c4a0a4b4a25ececaa42324ec1257b19ca7
SHA2560c395d52d5871c233dbe449d7b5edb69ee31303965bda64fab6969f3fbbd87a5
SHA5121851a9ecb6f003c6800648e0d0e0cd814e39da83e0dc855f6c03186ce9748bc654b185578abd984b7f9aeed1aa8c3f78d66a3c8c0acc92f9fee11d81d6c5d59f
-
Filesize
124KB
MD5fe6b0190806dbe8fbbcf5134f21fb7d6
SHA19b0b25c4a0a4b4a25ececaa42324ec1257b19ca7
SHA2560c395d52d5871c233dbe449d7b5edb69ee31303965bda64fab6969f3fbbd87a5
SHA5121851a9ecb6f003c6800648e0d0e0cd814e39da83e0dc855f6c03186ce9748bc654b185578abd984b7f9aeed1aa8c3f78d66a3c8c0acc92f9fee11d81d6c5d59f