Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
187s -
max time network
188s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2022, 10:31
Static task
static1
Behavioral task
behavioral1
Sample
9fc491c3579821e43a6fb3dda1514be3cf4d93c1a5b7d30a4319dd8b118b7c6f.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
9fc491c3579821e43a6fb3dda1514be3cf4d93c1a5b7d30a4319dd8b118b7c6f.exe
Resource
win10v2004-20220812-en
General
-
Target
9fc491c3579821e43a6fb3dda1514be3cf4d93c1a5b7d30a4319dd8b118b7c6f.exe
-
Size
181KB
-
MD5
703d7e01da1da65fc90bb12d911e1973
-
SHA1
9180909b6d14f79d8b3ab7af0fe4969e75c5c715
-
SHA256
9fc491c3579821e43a6fb3dda1514be3cf4d93c1a5b7d30a4319dd8b118b7c6f
-
SHA512
a91dd9fec03ed115ec4e86bf9bf93c69284341a65b26041c4bcab10703d2a2b6f55f853395f9c5e7159efd84cef491435dd3a63ce8cf27022f4e8497dbb68c6a
-
SSDEEP
3072:MfACg37XqjD/Y11m13OzCHqO/UYCjm4CNNDPuW1tGn:MfACgL6PYrm13OphYCjXCz/1G
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3900 Gkinoa.exe 4228 Gkinoa.exe -
Drops file in Windows directory 8 IoCs
description ioc Process File opened for modification C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job Gkinoa.exe File created C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job 9fc491c3579821e43a6fb3dda1514be3cf4d93c1a5b7d30a4319dd8b118b7c6f.exe File opened for modification C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job 9fc491c3579821e43a6fb3dda1514be3cf4d93c1a5b7d30a4319dd8b118b7c6f.exe File created C:\Windows\Gkinoa.exe 9fc491c3579821e43a6fb3dda1514be3cf4d93c1a5b7d30a4319dd8b118b7c6f.exe File opened for modification C:\Windows\Gkinoa.exe 9fc491c3579821e43a6fb3dda1514be3cf4d93c1a5b7d30a4319dd8b118b7c6f.exe File created C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job Gkinoa.exe File opened for modification C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job Gkinoa.exe File created C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job Gkinoa.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main Gkinoa.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\International Gkinoa.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3900 Gkinoa.exe 3900 Gkinoa.exe 3900 Gkinoa.exe 3900 Gkinoa.exe 3900 Gkinoa.exe 3900 Gkinoa.exe 3900 Gkinoa.exe 3900 Gkinoa.exe 3900 Gkinoa.exe 3900 Gkinoa.exe 3900 Gkinoa.exe 3900 Gkinoa.exe 3900 Gkinoa.exe 3900 Gkinoa.exe 3900 Gkinoa.exe 3900 Gkinoa.exe 3900 Gkinoa.exe 3900 Gkinoa.exe 3900 Gkinoa.exe 3900 Gkinoa.exe 3900 Gkinoa.exe 3900 Gkinoa.exe 3900 Gkinoa.exe 3900 Gkinoa.exe 3900 Gkinoa.exe 3900 Gkinoa.exe 3900 Gkinoa.exe 3900 Gkinoa.exe 3900 Gkinoa.exe 3900 Gkinoa.exe 3900 Gkinoa.exe 3900 Gkinoa.exe 3900 Gkinoa.exe 3900 Gkinoa.exe 3900 Gkinoa.exe 3900 Gkinoa.exe 3900 Gkinoa.exe 3900 Gkinoa.exe 3900 Gkinoa.exe 3900 Gkinoa.exe 3900 Gkinoa.exe 3900 Gkinoa.exe 3900 Gkinoa.exe 3900 Gkinoa.exe 3900 Gkinoa.exe 3900 Gkinoa.exe 3900 Gkinoa.exe 3900 Gkinoa.exe 3900 Gkinoa.exe 3900 Gkinoa.exe 3900 Gkinoa.exe 3900 Gkinoa.exe 3900 Gkinoa.exe 3900 Gkinoa.exe 3900 Gkinoa.exe 3900 Gkinoa.exe 3900 Gkinoa.exe 3900 Gkinoa.exe 3900 Gkinoa.exe 3900 Gkinoa.exe 3900 Gkinoa.exe 3900 Gkinoa.exe 3900 Gkinoa.exe 3900 Gkinoa.exe -
Suspicious behavior: GetForegroundWindowSpam 3 IoCs
pid Process 4848 9fc491c3579821e43a6fb3dda1514be3cf4d93c1a5b7d30a4319dd8b118b7c6f.exe 3900 Gkinoa.exe 4228 Gkinoa.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4848 wrote to memory of 3900 4848 9fc491c3579821e43a6fb3dda1514be3cf4d93c1a5b7d30a4319dd8b118b7c6f.exe 81 PID 4848 wrote to memory of 3900 4848 9fc491c3579821e43a6fb3dda1514be3cf4d93c1a5b7d30a4319dd8b118b7c6f.exe 81 PID 4848 wrote to memory of 3900 4848 9fc491c3579821e43a6fb3dda1514be3cf4d93c1a5b7d30a4319dd8b118b7c6f.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\9fc491c3579821e43a6fb3dda1514be3cf4d93c1a5b7d30a4319dd8b118b7c6f.exe"C:\Users\Admin\AppData\Local\Temp\9fc491c3579821e43a6fb3dda1514be3cf4d93c1a5b7d30a4319dd8b118b7c6f.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Windows\Gkinoa.exeC:\Windows\Gkinoa.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:3900
-
-
C:\Windows\Gkinoa.exeC:\Windows\Gkinoa.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
PID:4228
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
181KB
MD5703d7e01da1da65fc90bb12d911e1973
SHA19180909b6d14f79d8b3ab7af0fe4969e75c5c715
SHA2569fc491c3579821e43a6fb3dda1514be3cf4d93c1a5b7d30a4319dd8b118b7c6f
SHA512a91dd9fec03ed115ec4e86bf9bf93c69284341a65b26041c4bcab10703d2a2b6f55f853395f9c5e7159efd84cef491435dd3a63ce8cf27022f4e8497dbb68c6a
-
Filesize
181KB
MD5703d7e01da1da65fc90bb12d911e1973
SHA19180909b6d14f79d8b3ab7af0fe4969e75c5c715
SHA2569fc491c3579821e43a6fb3dda1514be3cf4d93c1a5b7d30a4319dd8b118b7c6f
SHA512a91dd9fec03ed115ec4e86bf9bf93c69284341a65b26041c4bcab10703d2a2b6f55f853395f9c5e7159efd84cef491435dd3a63ce8cf27022f4e8497dbb68c6a
-
Filesize
181KB
MD5703d7e01da1da65fc90bb12d911e1973
SHA19180909b6d14f79d8b3ab7af0fe4969e75c5c715
SHA2569fc491c3579821e43a6fb3dda1514be3cf4d93c1a5b7d30a4319dd8b118b7c6f
SHA512a91dd9fec03ed115ec4e86bf9bf93c69284341a65b26041c4bcab10703d2a2b6f55f853395f9c5e7159efd84cef491435dd3a63ce8cf27022f4e8497dbb68c6a
-
Filesize
426B
MD5076dfdc9b83191b5cc795c7e5111292e
SHA188bc434d25c5ee59f6d90ebf294e90fcb981ffae
SHA256b0d80ead0d897be8c3188c947a168c5548ffcc84be18774c713bd59815260354
SHA512997407b14ac1d3cb815b5c109f621195e097dffcc991e830ce4d557287090917000ba27f09eea25ad1d1935048fc5ea82804d8b51dc64b13e744034f4576d3b1
-
Filesize
264B
MD55297b2b12870662f6586251d792eae5b
SHA13f756331af2e564e2c82516ef54d94358504a745
SHA256aea6bc4636c7c74586e05ee47c34cf1b07927c47a1de7a7f40a6bd544b609801
SHA512f4ae08a895fa3fd04586b99c9c13d007871457e6110d72118971792fd46dc2a56a0909ff8773313e50317b9760f3220a5edaa8e580028c8d99b11c0078d03051