Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
156s -
max time network
177s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2022, 19:25
Static task
static1
Behavioral task
behavioral1
Sample
bc766b31110e788266adc5307d330ba78ae82545aa26e54407fc1e387f4cf6fe.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bc766b31110e788266adc5307d330ba78ae82545aa26e54407fc1e387f4cf6fe.exe
Resource
win10v2004-20220812-en
General
-
Target
bc766b31110e788266adc5307d330ba78ae82545aa26e54407fc1e387f4cf6fe.exe
-
Size
236KB
-
MD5
0371732ffa8872a148e4877c65f2c30c
-
SHA1
a741040c2b93ec0e6130a8490c72db2eea1e1fdb
-
SHA256
bc766b31110e788266adc5307d330ba78ae82545aa26e54407fc1e387f4cf6fe
-
SHA512
fe76c236c939914cba0d90166e8bebb33d18112ee936b32a2159424d6d24fc28b5a14b910c249e6995761ece20e33312448eb08016988e41f2d7fd1eec7b8694
-
SSDEEP
6144:Nl3d7WDugvM2ZmzpYEa7O5HVWYsRcuZpu8llsUiD:fN7WSgvM28zw7AMpRbZpu8T9iD
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\360Ö÷¶¯·ÀÓù = "C:WINDOWS\\SHELLNEW\\sever.exe" reg.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2220 bc766b31110e788266adc5307d330ba78ae82545aa26e54407fc1e387f4cf6fe.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2220 wrote to memory of 3500 2220 bc766b31110e788266adc5307d330ba78ae82545aa26e54407fc1e387f4cf6fe.exe 81 PID 2220 wrote to memory of 3500 2220 bc766b31110e788266adc5307d330ba78ae82545aa26e54407fc1e387f4cf6fe.exe 81 PID 2220 wrote to memory of 3500 2220 bc766b31110e788266adc5307d330ba78ae82545aa26e54407fc1e387f4cf6fe.exe 81 PID 3500 wrote to memory of 2068 3500 cmd.exe 83 PID 3500 wrote to memory of 2068 3500 cmd.exe 83 PID 3500 wrote to memory of 2068 3500 cmd.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc766b31110e788266adc5307d330ba78ae82545aa26e54407fc1e387f4cf6fe.exe"C:\Users\Admin\AppData\Local\Temp\bc766b31110e788266adc5307d330ba78ae82545aa26e54407fc1e387f4cf6fe.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c reg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v 360Ö÷¶¯·ÀÓù /d C:WINDOWS\SHELLNEW\sever.exe /f2⤵
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\Windows\SysWOW64\reg.exereg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v 360Ö÷¶¯·ÀÓù /d C:WINDOWS\SHELLNEW\sever.exe /f3⤵
- Adds Run key to start application
PID:2068
-
-