Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
113s -
max time network
179s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2022, 14:27
Static task
static1
Behavioral task
behavioral1
Sample
49da13502c8a316bcbc95f738f3555c8923ee852b2ef92a4da0b97837c9173a2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
49da13502c8a316bcbc95f738f3555c8923ee852b2ef92a4da0b97837c9173a2.exe
Resource
win10v2004-20220812-en
General
-
Target
49da13502c8a316bcbc95f738f3555c8923ee852b2ef92a4da0b97837c9173a2.exe
-
Size
59KB
-
MD5
6b64c33c7b9039aaa3e380e5a487c94d
-
SHA1
edb2e5ad0ffa62ea9e914ac519cec331d9b60dde
-
SHA256
49da13502c8a316bcbc95f738f3555c8923ee852b2ef92a4da0b97837c9173a2
-
SHA512
054dd83ab7337dab6801182656c303534dddb8d73c9cd262efafe7d3594fb069f8cfc7dd8571ba272b64dff65bb22b6e4adaa8199147aa3bc5ab78382abcd0b2
-
SSDEEP
768:a6E8i6hg36AJFENnpTmAEGccV9hKHnnrCfsWq6OpBK9DacyTm6mRuCvxPQN:m6hg3j+fTzc9HrCfbq6OpgRacQC2N
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1532 Sogou.exe 2844 Sougou.exe 856 Sogou.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run 49da13502c8a316bcbc95f738f3555c8923ee852b2ef92a4da0b97837c9173a2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Ball = "C:\\progra~1\\Common Files\\Sogou.exe" 49da13502c8a316bcbc95f738f3555c8923ee852b2ef92a4da0b97837c9173a2.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run Sougou.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Ball = "C:\\progra~1\\Common Files\\Sogou.exe" Sougou.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\Sougou.exe Sogou.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\progra~1\Common Files\Sogou.exe 49da13502c8a316bcbc95f738f3555c8923ee852b2ef92a4da0b97837c9173a2.exe File opened for modification C:\progra~1\Common Files\Sogou.exe 49da13502c8a316bcbc95f738f3555c8923ee852b2ef92a4da0b97837c9173a2.exe File created C:\progra~1\Common Files\Sogou.exe Sougou.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4896 wrote to memory of 1532 4896 49da13502c8a316bcbc95f738f3555c8923ee852b2ef92a4da0b97837c9173a2.exe 78 PID 4896 wrote to memory of 1532 4896 49da13502c8a316bcbc95f738f3555c8923ee852b2ef92a4da0b97837c9173a2.exe 78 PID 4896 wrote to memory of 1532 4896 49da13502c8a316bcbc95f738f3555c8923ee852b2ef92a4da0b97837c9173a2.exe 78 PID 2844 wrote to memory of 856 2844 Sougou.exe 80 PID 2844 wrote to memory of 856 2844 Sougou.exe 80 PID 2844 wrote to memory of 856 2844 Sougou.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\49da13502c8a316bcbc95f738f3555c8923ee852b2ef92a4da0b97837c9173a2.exe"C:\Users\Admin\AppData\Local\Temp\49da13502c8a316bcbc95f738f3555c8923ee852b2ef92a4da0b97837c9173a2.exe"1⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\progra~1\Common Files\Sogou.exe"C:\progra~1\Common Files\Sogou.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1532
-
-
C:\Windows\SysWOW64\Sougou.exeC:\Windows\SysWOW64\Sougou.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\progra~1\Common Files\Sogou.exe"C:\progra~1\Common Files\Sogou.exe"2⤵
- Executes dropped EXE
PID:856
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
59KB
MD56b64c33c7b9039aaa3e380e5a487c94d
SHA1edb2e5ad0ffa62ea9e914ac519cec331d9b60dde
SHA25649da13502c8a316bcbc95f738f3555c8923ee852b2ef92a4da0b97837c9173a2
SHA512054dd83ab7337dab6801182656c303534dddb8d73c9cd262efafe7d3594fb069f8cfc7dd8571ba272b64dff65bb22b6e4adaa8199147aa3bc5ab78382abcd0b2
-
Filesize
59KB
MD56b64c33c7b9039aaa3e380e5a487c94d
SHA1edb2e5ad0ffa62ea9e914ac519cec331d9b60dde
SHA25649da13502c8a316bcbc95f738f3555c8923ee852b2ef92a4da0b97837c9173a2
SHA512054dd83ab7337dab6801182656c303534dddb8d73c9cd262efafe7d3594fb069f8cfc7dd8571ba272b64dff65bb22b6e4adaa8199147aa3bc5ab78382abcd0b2
-
Filesize
27.1MB
MD5a7212ebd25a239a96f6e9dba3ed6b178
SHA1b1f11862c38a6f2f4851b770b00e9cecdcf0df1a
SHA256ea9bda48694fd20c687566039e8b41909dfa0ed25bbc407b05747d75350c6330
SHA512b89b265365f2566d2f3d84a4c66ccbb71fa06abcb7eb4b674a846a9274479639be0d61e6c18c6ed9b0375698dfaf72e1e202f3cff437a7264bb1dd32701d840a
-
Filesize
27.1MB
MD5a7212ebd25a239a96f6e9dba3ed6b178
SHA1b1f11862c38a6f2f4851b770b00e9cecdcf0df1a
SHA256ea9bda48694fd20c687566039e8b41909dfa0ed25bbc407b05747d75350c6330
SHA512b89b265365f2566d2f3d84a4c66ccbb71fa06abcb7eb4b674a846a9274479639be0d61e6c18c6ed9b0375698dfaf72e1e202f3cff437a7264bb1dd32701d840a
-
Filesize
59KB
MD56b64c33c7b9039aaa3e380e5a487c94d
SHA1edb2e5ad0ffa62ea9e914ac519cec331d9b60dde
SHA25649da13502c8a316bcbc95f738f3555c8923ee852b2ef92a4da0b97837c9173a2
SHA512054dd83ab7337dab6801182656c303534dddb8d73c9cd262efafe7d3594fb069f8cfc7dd8571ba272b64dff65bb22b6e4adaa8199147aa3bc5ab78382abcd0b2