Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
190s -
max time network
198s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2022, 13:29
Static task
static1
Behavioral task
behavioral1
Sample
410bafda251c7d2cd8322adf2d15078e8b53e8a86548a96c4cb8a41e80c247f9.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
410bafda251c7d2cd8322adf2d15078e8b53e8a86548a96c4cb8a41e80c247f9.exe
Resource
win10v2004-20220812-en
General
-
Target
410bafda251c7d2cd8322adf2d15078e8b53e8a86548a96c4cb8a41e80c247f9.exe
-
Size
87KB
-
MD5
057cf84ddf34c10a3d5d6ad2c7756783
-
SHA1
316fe59833cbf1afd7d615f0777b03756a7c548a
-
SHA256
410bafda251c7d2cd8322adf2d15078e8b53e8a86548a96c4cb8a41e80c247f9
-
SHA512
4dedc6c45d19a1799319bd81fd7c1a69a761a36696ff569da3930eee1eed51c3f461ddd325e20de3a7a0e23f56dd05b4c3f210fb6219d2a6962a2c70a30eec8a
-
SSDEEP
768:/mf8iCXQ6FbSVO5eP4e1Ih3nQ8baOfQxhnrv:28iFVO5nnQ8uK+
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1436 uptime.exe 3832 uptime.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run uptime.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\PC UPTIME = "C:\\Users\\Admin\\AppData\\Roaming\\uptime.exe" uptime.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run uptime.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\PC UPTIME = "C:\\Users\\Admin\\AppData\\Roaming\\uptime.exe" uptime.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\systeme.acm uptime.exe File opened for modification C:\Windows\SysWOW64\systeme.acm uptime.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4736 set thread context of 1724 4736 410bafda251c7d2cd8322adf2d15078e8b53e8a86548a96c4cb8a41e80c247f9.exe 79 PID 1436 set thread context of 3832 1436 uptime.exe 81 -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4736 wrote to memory of 1724 4736 410bafda251c7d2cd8322adf2d15078e8b53e8a86548a96c4cb8a41e80c247f9.exe 79 PID 4736 wrote to memory of 1724 4736 410bafda251c7d2cd8322adf2d15078e8b53e8a86548a96c4cb8a41e80c247f9.exe 79 PID 4736 wrote to memory of 1724 4736 410bafda251c7d2cd8322adf2d15078e8b53e8a86548a96c4cb8a41e80c247f9.exe 79 PID 4736 wrote to memory of 1724 4736 410bafda251c7d2cd8322adf2d15078e8b53e8a86548a96c4cb8a41e80c247f9.exe 79 PID 4736 wrote to memory of 1724 4736 410bafda251c7d2cd8322adf2d15078e8b53e8a86548a96c4cb8a41e80c247f9.exe 79 PID 4736 wrote to memory of 1724 4736 410bafda251c7d2cd8322adf2d15078e8b53e8a86548a96c4cb8a41e80c247f9.exe 79 PID 4736 wrote to memory of 1724 4736 410bafda251c7d2cd8322adf2d15078e8b53e8a86548a96c4cb8a41e80c247f9.exe 79 PID 1724 wrote to memory of 1436 1724 410bafda251c7d2cd8322adf2d15078e8b53e8a86548a96c4cb8a41e80c247f9.exe 80 PID 1724 wrote to memory of 1436 1724 410bafda251c7d2cd8322adf2d15078e8b53e8a86548a96c4cb8a41e80c247f9.exe 80 PID 1724 wrote to memory of 1436 1724 410bafda251c7d2cd8322adf2d15078e8b53e8a86548a96c4cb8a41e80c247f9.exe 80 PID 1436 wrote to memory of 3832 1436 uptime.exe 81 PID 1436 wrote to memory of 3832 1436 uptime.exe 81 PID 1436 wrote to memory of 3832 1436 uptime.exe 81 PID 1436 wrote to memory of 3832 1436 uptime.exe 81 PID 1436 wrote to memory of 3832 1436 uptime.exe 81 PID 1436 wrote to memory of 3832 1436 uptime.exe 81 PID 1436 wrote to memory of 3832 1436 uptime.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\410bafda251c7d2cd8322adf2d15078e8b53e8a86548a96c4cb8a41e80c247f9.exe"C:\Users\Admin\AppData\Local\Temp\410bafda251c7d2cd8322adf2d15078e8b53e8a86548a96c4cb8a41e80c247f9.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Users\Admin\AppData\Local\Temp\410bafda251c7d2cd8322adf2d15078e8b53e8a86548a96c4cb8a41e80c247f9.exeC:\Users\Admin\AppData\Local\Temp\410bafda251c7d2cd8322adf2d15078e8b53e8a86548a96c4cb8a41e80c247f9.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Users\Admin\AppData\Roaming\uptime.exe"C:\Users\Admin\AppData\Roaming\\uptime.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Users\Admin\AppData\Roaming\uptime.exeC:\Users\Admin\AppData\Roaming\uptime.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:3832
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
87KB
MD5057cf84ddf34c10a3d5d6ad2c7756783
SHA1316fe59833cbf1afd7d615f0777b03756a7c548a
SHA256410bafda251c7d2cd8322adf2d15078e8b53e8a86548a96c4cb8a41e80c247f9
SHA5124dedc6c45d19a1799319bd81fd7c1a69a761a36696ff569da3930eee1eed51c3f461ddd325e20de3a7a0e23f56dd05b4c3f210fb6219d2a6962a2c70a30eec8a
-
Filesize
87KB
MD5057cf84ddf34c10a3d5d6ad2c7756783
SHA1316fe59833cbf1afd7d615f0777b03756a7c548a
SHA256410bafda251c7d2cd8322adf2d15078e8b53e8a86548a96c4cb8a41e80c247f9
SHA5124dedc6c45d19a1799319bd81fd7c1a69a761a36696ff569da3930eee1eed51c3f461ddd325e20de3a7a0e23f56dd05b4c3f210fb6219d2a6962a2c70a30eec8a
-
Filesize
87KB
MD5057cf84ddf34c10a3d5d6ad2c7756783
SHA1316fe59833cbf1afd7d615f0777b03756a7c548a
SHA256410bafda251c7d2cd8322adf2d15078e8b53e8a86548a96c4cb8a41e80c247f9
SHA5124dedc6c45d19a1799319bd81fd7c1a69a761a36696ff569da3930eee1eed51c3f461ddd325e20de3a7a0e23f56dd05b4c3f210fb6219d2a6962a2c70a30eec8a