Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2022, 02:02
Behavioral task
behavioral1
Sample
fb963c0193407ddbfa5fc5ad86f26cecf1f12a797362f1997aaa36323b74dfce.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
fb963c0193407ddbfa5fc5ad86f26cecf1f12a797362f1997aaa36323b74dfce.exe
Resource
win10v2004-20220901-en
General
-
Target
fb963c0193407ddbfa5fc5ad86f26cecf1f12a797362f1997aaa36323b74dfce.exe
-
Size
28KB
-
MD5
72db5490453b137c76caee27e788e7d0
-
SHA1
2d31fc8bddb1dc2ca01d9699e4167b90eb5702e2
-
SHA256
fb963c0193407ddbfa5fc5ad86f26cecf1f12a797362f1997aaa36323b74dfce
-
SHA512
ed4b654747f7678ff69ed881aaf7cb7ca13f24ef0ac4628ef69ff8ae55e8f0a9e1ee7e6ea285c91a172bc68366167f2af0d575e9827e96a30f93cc6560dfc08f
-
SSDEEP
384:1vxBbK26lj5Id8SpHx9jLhsznnVxA1WmP5w7GGCJlqqwMyNj6Ar04:Dv8IRRdsxq1DjJcqfaTn
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2012 services.exe -
resource yara_rule behavioral2/files/0x0004000000022df5-133.dat upx behavioral2/files/0x0004000000022df5-134.dat upx behavioral2/memory/4064-136-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/2012-137-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/2012-138-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" fb963c0193407ddbfa5fc5ad86f26cecf1f12a797362f1997aaa36323b74dfce.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\java.exe fb963c0193407ddbfa5fc5ad86f26cecf1f12a797362f1997aaa36323b74dfce.exe File created C:\Windows\services.exe fb963c0193407ddbfa5fc5ad86f26cecf1f12a797362f1997aaa36323b74dfce.exe File opened for modification C:\Windows\java.exe fb963c0193407ddbfa5fc5ad86f26cecf1f12a797362f1997aaa36323b74dfce.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4064 wrote to memory of 2012 4064 fb963c0193407ddbfa5fc5ad86f26cecf1f12a797362f1997aaa36323b74dfce.exe 85 PID 4064 wrote to memory of 2012 4064 fb963c0193407ddbfa5fc5ad86f26cecf1f12a797362f1997aaa36323b74dfce.exe 85 PID 4064 wrote to memory of 2012 4064 fb963c0193407ddbfa5fc5ad86f26cecf1f12a797362f1997aaa36323b74dfce.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb963c0193407ddbfa5fc5ad86f26cecf1f12a797362f1997aaa36323b74dfce.exe"C:\Users\Admin\AppData\Local\Temp\fb963c0193407ddbfa5fc5ad86f26cecf1f12a797362f1997aaa36323b74dfce.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2012
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a7def0e0dcebbc758450ca021db65cce
SHA1cc300a98164278d3b859f70b8a71e1f3e9a5fe06
SHA256d9ea2c839b64f118c3bc90723bc842650209b0669d6aa7a1c9dadee4de57f842
SHA512b40b7344a8041f4f091db98eb98654b34462d796a63744c9f1c9b2c001c704bdb42a11666c4210976b98fdbf4fbbccfdd3a5b56dca765827635c6158398d7cca
-
Filesize
1KB
MD573d7e4969c5567617988182385d54121
SHA153efd527f2107e640076028e07487d111d3d1663
SHA25612e92ec9f139e40943ab2cf274cb348736a22df0a0ee7fc3f511a8637e2ecdd0
SHA512c79e152fbd1dfae4f188ccd5068d253a5bd7ae70318a5024e7786f26494d576f26e5a2926760ab8bcefd948af4fb2b44f8f587d7fb87b47d08231ba2e7f6792d
-
Filesize
1KB
MD591c19319d7c9c6adf45f907a6c246488
SHA1d6b22062e3338c75d686e9749a71efa6c8a44d19
SHA2563621435474d67f0187eaa4e6e3ab4eb5d9d1d9c55905f6c74416ed44363784c3
SHA512b5ceb1358071aa22ee72306c36dfd3d989aca6a8c108dbded52f7b4ce920b581d59d91896f07c952b424ae6b0bc1fa6005f92f036046b15eddadac2908ad84a9
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2