Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    94s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/10/2022, 21:53

General

  • Target

    7dbac2daee233143824effcec01e111374ddde8104a4fff87537d814d77ea7c3.exe

  • Size

    729KB

  • MD5

    24534ada3f3996c3a8f389786cff0f86

  • SHA1

    2928300fd34d0fec071f50151ac1f860a4870bc1

  • SHA256

    7dbac2daee233143824effcec01e111374ddde8104a4fff87537d814d77ea7c3

  • SHA512

    4a6a3fc879435f4af4e78d99d0a060bdea3c844f366b3bb0f412b995e11c2a3521c8becab1aa3280735438a183e00864dbe3b37e8ac839fcc210f8abbd80a9b6

  • SSDEEP

    1536:OKD0A2T3vLbsih9e8bTTpb/IgQmP9zKcTDB4w/UjlQ/dpKRqm:352T3siXei5bcmP9JfUjWU

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7dbac2daee233143824effcec01e111374ddde8104a4fff87537d814d77ea7c3.exe
    "C:\Users\Admin\AppData\Local\Temp\7dbac2daee233143824effcec01e111374ddde8104a4fff87537d814d77ea7c3.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:3240
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c c:\$$$$$.bat
      2⤵
        PID:4992

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \??\c:\$$$$$.bat

      Filesize

      264B

      MD5

      9a910f633bbcb246ff456b6a10e44d18

      SHA1

      5ec37e4fff55ed2c42cae04d249680cc9fb12be5

      SHA256

      d5da4abe00d13949313c0fcf3a948cc39ed899da76631afec55e020fc67e54c0

      SHA512

      5c19eda9886771c08bcc265dfe851de964764ddec6dc518ba58ec4bf055a64695e584d2117a26548ef33086f8d7b6f559ba0f3bf8192b24c4c144333663c2050

    • memory/3240-132-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/3240-133-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/3240-135-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB