Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
91s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
21/09/2022, 04:38
Behavioral task
behavioral1
Sample
982ca06b16a7e3f3ff43bbf537791d7e192bb18182513e497b68cd90a8836d69.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
982ca06b16a7e3f3ff43bbf537791d7e192bb18182513e497b68cd90a8836d69.exe
Resource
win10v2004-20220812-en
General
-
Target
982ca06b16a7e3f3ff43bbf537791d7e192bb18182513e497b68cd90a8836d69.exe
-
Size
377KB
-
MD5
bf23d986655ed3e972080eb248ca8dba
-
SHA1
abdf08009dc49e0c7886701ce5568d54ae7596c7
-
SHA256
982ca06b16a7e3f3ff43bbf537791d7e192bb18182513e497b68cd90a8836d69
-
SHA512
a107c7f703e8943efd1a10f8904a71e219761c8e2423a5f5784011d2b7b60bf2cf76fdde2c60bda35c710e9dc59e882b352c7418d5227a731e466556fae61503
-
SSDEEP
6144:j+ssXv5jUA2OpjesAOfoTb+v+90TveVBciZnbCUxP4C9tgf/AN1LtdReCBJJKKrz:ZOv5jKhsfoPA+yeVKUCUxP4C902bdRtX
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1048-132-0x0000000000400000-0x00000000004EE000-memory.dmp upx behavioral2/memory/1048-136-0x0000000000400000-0x00000000004EE000-memory.dmp upx -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/1048-136-0x0000000000400000-0x00000000004EE000-memory.dmp autoit_exe -
Runs net.exe
-
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1048 wrote to memory of 1260 1048 982ca06b16a7e3f3ff43bbf537791d7e192bb18182513e497b68cd90a8836d69.exe 79 PID 1048 wrote to memory of 1260 1048 982ca06b16a7e3f3ff43bbf537791d7e192bb18182513e497b68cd90a8836d69.exe 79 PID 1048 wrote to memory of 1260 1048 982ca06b16a7e3f3ff43bbf537791d7e192bb18182513e497b68cd90a8836d69.exe 79 PID 1260 wrote to memory of 1696 1260 cmd.exe 81 PID 1260 wrote to memory of 1696 1260 cmd.exe 81 PID 1260 wrote to memory of 1696 1260 cmd.exe 81 PID 1696 wrote to memory of 1796 1696 net.exe 82 PID 1696 wrote to memory of 1796 1696 net.exe 82 PID 1696 wrote to memory of 1796 1696 net.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\982ca06b16a7e3f3ff43bbf537791d7e192bb18182513e497b68cd90a8836d69.exe"C:\Users\Admin\AppData\Local\Temp\982ca06b16a7e3f3ff43bbf537791d7e192bb18182513e497b68cd90a8836d69.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c net user administrator /active:yes2⤵
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Windows\SysWOW64\net.exenet user administrator /active:yes3⤵
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 user administrator /active:yes4⤵PID:1796
-
-
-