Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
69s -
max time network
76s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29/09/2022, 14:12
Behavioral task
behavioral1
Sample
Build.bat
Resource
win10v2004-20220812-en
Behavioral task
behavioral2
Sample
builder.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral3
Sample
config.json
Resource
win10v2004-20220812-en
Behavioral task
behavioral4
Sample
keygen.exe
Resource
win10v2004-20220812-en
General
-
Target
Build.bat
-
Size
741B
-
MD5
4e46e28b2e61643f6af70a8b19e5cb1f
-
SHA1
804a1d0c4a280b18e778e4b97f85562fa6d5a4e6
-
SHA256
8e83a1727696ced618289f79674b97305d88beeeabf46bd25fc77ac53c1ae339
-
SHA512
009b17b515ff0ea612e54d8751eef07f1e2b54db07e6cd69a95e7adf775f3c79a0ea91bff2fe593f2314807fdc00c75d80f1807b7dbe90f0fcf94607e675047b
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 3168 wrote to memory of 916 3168 cmd.exe 82 PID 3168 wrote to memory of 916 3168 cmd.exe 82 PID 3168 wrote to memory of 916 3168 cmd.exe 82 PID 3168 wrote to memory of 2292 3168 cmd.exe 83 PID 3168 wrote to memory of 2292 3168 cmd.exe 83 PID 3168 wrote to memory of 2292 3168 cmd.exe 83 PID 3168 wrote to memory of 4328 3168 cmd.exe 84 PID 3168 wrote to memory of 4328 3168 cmd.exe 84 PID 3168 wrote to memory of 4328 3168 cmd.exe 84 PID 3168 wrote to memory of 4740 3168 cmd.exe 85 PID 3168 wrote to memory of 4740 3168 cmd.exe 85 PID 3168 wrote to memory of 4740 3168 cmd.exe 85 PID 3168 wrote to memory of 4936 3168 cmd.exe 86 PID 3168 wrote to memory of 4936 3168 cmd.exe 86 PID 3168 wrote to memory of 4936 3168 cmd.exe 86 PID 3168 wrote to memory of 4760 3168 cmd.exe 87 PID 3168 wrote to memory of 4760 3168 cmd.exe 87 PID 3168 wrote to memory of 4760 3168 cmd.exe 87 PID 3168 wrote to memory of 4660 3168 cmd.exe 88 PID 3168 wrote to memory of 4660 3168 cmd.exe 88 PID 3168 wrote to memory of 4660 3168 cmd.exe 88
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Build.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Users\Admin\AppData\Local\Temp\keygen.exekeygen -path C:\Users\Admin\AppData\Local\Temp\Build -pubkey pub.key -privkey priv.key2⤵PID:916
-
-
C:\Users\Admin\AppData\Local\Temp\builder.exebuilder -type dec -privkey C:\Users\Admin\AppData\Local\Temp\Build\priv.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\Build\LB3Decryptor.exe2⤵PID:2292
-
-
C:\Users\Admin\AppData\Local\Temp\builder.exebuilder -type enc -exe -pubkey C:\Users\Admin\AppData\Local\Temp\Build\pub.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\Build\LB3.exe2⤵PID:4328
-
-
C:\Users\Admin\AppData\Local\Temp\builder.exebuilder -type enc -exe -pass -pubkey C:\Users\Admin\AppData\Local\Temp\Build\pub.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\Build\LB3_pass.exe2⤵PID:4740
-
-
C:\Users\Admin\AppData\Local\Temp\builder.exebuilder -type enc -dll -pubkey C:\Users\Admin\AppData\Local\Temp\Build\pub.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\Build\LB3_Rundll32.dll2⤵PID:4936
-
-
C:\Users\Admin\AppData\Local\Temp\builder.exebuilder -type enc -dll -pass -pubkey C:\Users\Admin\AppData\Local\Temp\Build\pub.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\Build\LB3_Rundll32_pass.dll2⤵PID:4760
-
-
C:\Users\Admin\AppData\Local\Temp\builder.exebuilder -type enc -ref -pubkey C:\Users\Admin\AppData\Local\Temp\Build\pub.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\Build\LB3_ReflectiveDll_DllMain.dll2⤵PID:4660
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
344B
MD5a01fe80bd439daf7b3ce844d6d049c87
SHA159b99d611349fc473c32e5320623783d08191364
SHA256c90f0d8583f70b2814f7e76253342a177a0fe1739265a576d415b2a0fd21df01
SHA512e515043c50f629904e69fac3ec0f38a4d3d15e00234e1dab302bf351861450fe4ddd9de8119e8ef15f9e35b47a35481208cd0898297fbd0bae330d6b28b26e66
-
Filesize
344B
MD5c33caeb2fed30526198b3e2089b22b45
SHA1dc4ca0943ed8aaeb37af473e4e68ead73f46aa3f
SHA256a9e49a832783226897e48ed26b46b08621f8f9a08c2c69b1462ccb07b9334090
SHA512a2410c66c21dc2d063d0efb9fd4066bc5708682af190372e443e49426b88a3941f57cdc746112e9243fabd4950697f0948fabf550a2460637bccf8129b9734dd