Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2022, 15:43
Behavioral task
behavioral1
Sample
84d58039ddcf0461f75a47134d4c9eedea036bcc175100a1b22cb5ca7ead10c8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
84d58039ddcf0461f75a47134d4c9eedea036bcc175100a1b22cb5ca7ead10c8.exe
Resource
win10v2004-20220812-en
General
-
Target
84d58039ddcf0461f75a47134d4c9eedea036bcc175100a1b22cb5ca7ead10c8.exe
-
Size
28KB
-
MD5
4c2ec8069573848e65c0e537345889de
-
SHA1
ff1dd04395c60dcc83fafddfdf5092c58e39f4ca
-
SHA256
84d58039ddcf0461f75a47134d4c9eedea036bcc175100a1b22cb5ca7ead10c8
-
SHA512
65a88c6df3df8e03584c0d2615f797ae854df1fc30ce2595ab446d11ced577240f662ee2bacd5e739aac04dfc3df4e5af44e60cf5109897d9ce5db780d9edbad
-
SSDEEP
384:1vxBbK26lj5Id8SpHx9jLhsznnVxA1WmP5w7GGCJlqqwMyNpHHCRjh:Dv8IRRdsxq1DjJcqfUHiRjh
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1196 services.exe -
resource yara_rule behavioral2/memory/548-132-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/files/0x0007000000022f5a-134.dat upx behavioral2/files/0x0007000000022f5a-135.dat upx behavioral2/memory/1196-137-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/548-138-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/1196-139-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" 84d58039ddcf0461f75a47134d4c9eedea036bcc175100a1b22cb5ca7ead10c8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\services.exe 84d58039ddcf0461f75a47134d4c9eedea036bcc175100a1b22cb5ca7ead10c8.exe File opened for modification C:\Windows\java.exe 84d58039ddcf0461f75a47134d4c9eedea036bcc175100a1b22cb5ca7ead10c8.exe File created C:\Windows\java.exe 84d58039ddcf0461f75a47134d4c9eedea036bcc175100a1b22cb5ca7ead10c8.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 548 wrote to memory of 1196 548 84d58039ddcf0461f75a47134d4c9eedea036bcc175100a1b22cb5ca7ead10c8.exe 83 PID 548 wrote to memory of 1196 548 84d58039ddcf0461f75a47134d4c9eedea036bcc175100a1b22cb5ca7ead10c8.exe 83 PID 548 wrote to memory of 1196 548 84d58039ddcf0461f75a47134d4c9eedea036bcc175100a1b22cb5ca7ead10c8.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\84d58039ddcf0461f75a47134d4c9eedea036bcc175100a1b22cb5ca7ead10c8.exe"C:\Users\Admin\AppData\Local\Temp\84d58039ddcf0461f75a47134d4c9eedea036bcc175100a1b22cb5ca7ead10c8.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1196
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD54b35638085230c8f1ff8f48225c716ef
SHA1804de20982d21a933aac8dfe317145e00f1dafe4
SHA256aa626923c02aabb626dac52bab3b2e07d8bc919580301fdf0cee7a35cd00ab08
SHA512bfd8b6c8293db36f6d6327f85fbcaa607a593f86b736e6d751eab459fd94ab36f028efb97e0b2b10467a4751f3373c86db2e42da1a4e932a621c4f36d07ec692
-
Filesize
1KB
MD53de84d4060a520fed2da5728fb127f9b
SHA1bdf152f7a4f05a7322ca2e52a70d441e9163800f
SHA25615fc15036c82816a86a9160f80611236439be10a92dd55424abb5f57a794ae40
SHA512e394fa4f5d906dfcf3c5eda6279950f7b4538aad623cb2136c18e804d3532594c8519539c1877bda5a277b52748649619fb7b201584d85cf4d6e852757e73193
-
Filesize
1KB
MD5f0785815f8321e4e8b8051a6ca6acd9f
SHA19401c3889bc8b3afa98f35715f9f31453b9fae3a
SHA25649402dd083013a64f64634a42678d38cac5a789aff543c312819f26a818ce966
SHA512f423b046d6d69186f4096b0ab237368289a634594f7ea9dbebdddd5367d4456adb09003fe60b53ef741784bfe1ce5da6443df02d41fe265e7eb5e53b17c10b44
-
Filesize
1KB
MD56d2812ed33389d74ce8601f1f785b261
SHA171c1de99bbd8fd34beb094a545bf2b48e291048d
SHA2561e438bdfd7893af7b84f5a8ed4ae746391eee4466066235234f7124cf902b3a4
SHA51268939b175e2985eca8a3a49b1c0a2940ee960c5e0d1a7bd081dd75ffc5352228fee9678a29233efc7a7a79f0a36ec12bd3598279750d1cecdfd3389355c94413
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2