Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
90s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
23/11/2022, 21:13
Static task
static1
Behavioral task
behavioral1
Sample
2143defd25d2fe066ccf8b91eead696f54bc007170623fb291ae4ff565e9872c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2143defd25d2fe066ccf8b91eead696f54bc007170623fb291ae4ff565e9872c.exe
Resource
win10v2004-20220901-en
General
-
Target
2143defd25d2fe066ccf8b91eead696f54bc007170623fb291ae4ff565e9872c.exe
-
Size
76KB
-
MD5
272870fedad583cf538f97a115f5a658
-
SHA1
1aad162d8b845a0b7b236038d2f40af08c8ae306
-
SHA256
2143defd25d2fe066ccf8b91eead696f54bc007170623fb291ae4ff565e9872c
-
SHA512
ed50b585601edc6b4ac37e2d033395c072b1ae67025ab6922eda81c64b7bd302d1e8d372cc5e33ef56e955556e5aea56574d1ff1e48753b2231686c4712fd9a5
-
SSDEEP
1536:Bo+PkB4ENPUwhweme0Dcuj6I9KRoxtxrUMVPeWq0pxIojLtiS9e:Bo+Pk+ePU4w9eScuj6I9pfxtVPeSIoNO
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 848 iexplore -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{21E9C5D3-EBFF-11CD-B6FD-00AA00B4E22A} 2143defd25d2fe066ccf8b91eead696f54bc007170623fb291ae4ff565e9872c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{21E9C5D3-EBFF-11CD-B6FD-00AA00B4E22A}\StubPath = "C:\\Program Files\\iexplore" 2143defd25d2fe066ccf8b91eead696f54bc007170623fb291ae4ff565e9872c.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 848 set thread context of 5072 848 iexplore 82 -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files\iexplore 2143defd25d2fe066ccf8b91eead696f54bc007170623fb291ae4ff565e9872c.exe File created C:\Program Files\iexplore 2143defd25d2fe066ccf8b91eead696f54bc007170623fb291ae4ff565e9872c.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1516 wrote to memory of 848 1516 2143defd25d2fe066ccf8b91eead696f54bc007170623fb291ae4ff565e9872c.exe 81 PID 1516 wrote to memory of 848 1516 2143defd25d2fe066ccf8b91eead696f54bc007170623fb291ae4ff565e9872c.exe 81 PID 1516 wrote to memory of 848 1516 2143defd25d2fe066ccf8b91eead696f54bc007170623fb291ae4ff565e9872c.exe 81 PID 848 wrote to memory of 5072 848 iexplore 82 PID 848 wrote to memory of 5072 848 iexplore 82 PID 848 wrote to memory of 5072 848 iexplore 82 PID 848 wrote to memory of 5072 848 iexplore 82 PID 848 wrote to memory of 5072 848 iexplore 82 PID 1516 wrote to memory of 4748 1516 2143defd25d2fe066ccf8b91eead696f54bc007170623fb291ae4ff565e9872c.exe 83 PID 1516 wrote to memory of 4748 1516 2143defd25d2fe066ccf8b91eead696f54bc007170623fb291ae4ff565e9872c.exe 83 PID 1516 wrote to memory of 4748 1516 2143defd25d2fe066ccf8b91eead696f54bc007170623fb291ae4ff565e9872c.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\2143defd25d2fe066ccf8b91eead696f54bc007170623fb291ae4ff565e9872c.exe"C:\Users\Admin\AppData\Local\Temp\2143defd25d2fe066ccf8b91eead696f54bc007170623fb291ae4ff565e9872c.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Program Files\iexplore"C:\Program Files\iexplore"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Windows\SysWOW64\userinit.exeC:\Windows\SYSTEM32\userinit.exe3⤵PID:5072
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Local\Temp\2143defd25d2fe066ccf8b91eead696f54bc007170623fb291ae4ff565e9872c.exe"2⤵PID:4748
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD5272870fedad583cf538f97a115f5a658
SHA11aad162d8b845a0b7b236038d2f40af08c8ae306
SHA2562143defd25d2fe066ccf8b91eead696f54bc007170623fb291ae4ff565e9872c
SHA512ed50b585601edc6b4ac37e2d033395c072b1ae67025ab6922eda81c64b7bd302d1e8d372cc5e33ef56e955556e5aea56574d1ff1e48753b2231686c4712fd9a5
-
Filesize
76KB
MD5272870fedad583cf538f97a115f5a658
SHA11aad162d8b845a0b7b236038d2f40af08c8ae306
SHA2562143defd25d2fe066ccf8b91eead696f54bc007170623fb291ae4ff565e9872c
SHA512ed50b585601edc6b4ac37e2d033395c072b1ae67025ab6922eda81c64b7bd302d1e8d372cc5e33ef56e955556e5aea56574d1ff1e48753b2231686c4712fd9a5