Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
20/10/2022, 00:17
Behavioral task
behavioral1
Sample
ef2b31201ef852ed45c6eed87b082082665777ad8d97ad9326f5c9303e673b07.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ef2b31201ef852ed45c6eed87b082082665777ad8d97ad9326f5c9303e673b07.exe
Resource
win10v2004-20220901-en
General
-
Target
ef2b31201ef852ed45c6eed87b082082665777ad8d97ad9326f5c9303e673b07.exe
-
Size
28KB
-
MD5
a211d71d8f5fadf1733b30698e3bceb0
-
SHA1
910019d5946241ce8b90be2c34f9c1f1e06c29a7
-
SHA256
ef2b31201ef852ed45c6eed87b082082665777ad8d97ad9326f5c9303e673b07
-
SHA512
908989f6821204a1ba2380846a32bcea57fc1207be1ad7f5895907df2898866d58ca8bd451f38173fcd95b63e3f38abb1ad6f4c6f2fca57c8d1179bb660e05ea
-
SSDEEP
384:1vxBbK26lj5Id8SpHx9jLhsznnVxA1WmP5w7GGCJlqqwMyNyVL2R:Dv8IRRdsxq1DjJcqfDLm
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 360 services.exe -
resource yara_rule behavioral2/memory/1716-132-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/files/0x0003000000000735-134.dat upx behavioral2/files/0x0003000000000735-135.dat upx behavioral2/memory/360-137-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1716-138-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/360-139-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" ef2b31201ef852ed45c6eed87b082082665777ad8d97ad9326f5c9303e673b07.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\services.exe ef2b31201ef852ed45c6eed87b082082665777ad8d97ad9326f5c9303e673b07.exe File opened for modification C:\Windows\java.exe ef2b31201ef852ed45c6eed87b082082665777ad8d97ad9326f5c9303e673b07.exe File created C:\Windows\java.exe ef2b31201ef852ed45c6eed87b082082665777ad8d97ad9326f5c9303e673b07.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1716 wrote to memory of 360 1716 ef2b31201ef852ed45c6eed87b082082665777ad8d97ad9326f5c9303e673b07.exe 85 PID 1716 wrote to memory of 360 1716 ef2b31201ef852ed45c6eed87b082082665777ad8d97ad9326f5c9303e673b07.exe 85 PID 1716 wrote to memory of 360 1716 ef2b31201ef852ed45c6eed87b082082665777ad8d97ad9326f5c9303e673b07.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\ef2b31201ef852ed45c6eed87b082082665777ad8d97ad9326f5c9303e673b07.exe"C:\Users\Admin\AppData\Local\Temp\ef2b31201ef852ed45c6eed87b082082665777ad8d97ad9326f5c9303e673b07.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:360
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD595e0f15539abd8aacb35a6f843854bc1
SHA1416a6f3d7eacc7123851f86ea4b9b163729c5615
SHA2566ca0898f359f2e647a2709a0377c1908642eea678a44bfa9e7598e002f57c7a9
SHA512a54ac6121f20824bc1a349eb561624360f37b508aa7375a50c824e1ffbaab6a4dc03de6e55814de9883d24a7f9faecd0dce50c1b9ee84ac8d74a416926e2acfd
-
Filesize
1KB
MD5cbe88dd13f94526dd470ab561a872c36
SHA169c9f7ecbaca472fb0c51988b39d2d4169e17d97
SHA256f27ea5711b40566889c5c8a4205870952e21d9268f5d76445b2799a31f06f923
SHA5121b313e517739d339a0616b07ccd3c95dbe01e8369796645a09d50225aa6ea27cdad9a6d5a658f31dfdc1a72ff5a26243697d89a82da77ab4b4cd28d9cd1386b0
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2