Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
24/11/2022, 04:10
Static task
static1
Behavioral task
behavioral1
Sample
c1a4652dab20886ee5b938184653a0b2d1b95616557353cace78d415553c89bc.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c1a4652dab20886ee5b938184653a0b2d1b95616557353cace78d415553c89bc.exe
Resource
win10v2004-20221111-en
General
-
Target
c1a4652dab20886ee5b938184653a0b2d1b95616557353cace78d415553c89bc.exe
-
Size
166KB
-
MD5
1225cf024f08fdf7741a0f8f9aa4e017
-
SHA1
18058c507f8b6a4574405b054b8e8f7b19052d7d
-
SHA256
c1a4652dab20886ee5b938184653a0b2d1b95616557353cace78d415553c89bc
-
SHA512
4f76c84e1906eee5993c09d4d748c6faa9ddaeff3b4c097e8b10c20395d9ee1a7a10126a7968d37a64d28589f19df671057e3cf384cd66972e298717f4caa8c4
-
SSDEEP
3072:+/LXSE0vf7vHDBDRMxquipkcC3uewF2qH1NcZm7fJOWRwao9OgXcp:8ODRM8uqC35wFx/cZkhOIbOPu
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4088 svchost.exe 2072 svchost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mslivemsn = "C:\\Users\\Admin\\Librarys\\wgesdwx\\svchost.exe" c1a4652dab20886ee5b938184653a0b2d1b95616557353cace78d415553c89bc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 668 wrote to memory of 4088 668 c1a4652dab20886ee5b938184653a0b2d1b95616557353cace78d415553c89bc.exe 82 PID 668 wrote to memory of 4088 668 c1a4652dab20886ee5b938184653a0b2d1b95616557353cace78d415553c89bc.exe 82 PID 668 wrote to memory of 4088 668 c1a4652dab20886ee5b938184653a0b2d1b95616557353cace78d415553c89bc.exe 82 PID 4088 wrote to memory of 2072 4088 svchost.exe 83 PID 4088 wrote to memory of 2072 4088 svchost.exe 83 PID 4088 wrote to memory of 2072 4088 svchost.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1a4652dab20886ee5b938184653a0b2d1b95616557353cace78d415553c89bc.exe"C:\Users\Admin\AppData\Local\Temp\c1a4652dab20886ee5b938184653a0b2d1b95616557353cace78d415553c89bc.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:668 -
C:\Users\Admin\Librarys\wgesdwx\svchost.exeC:\Users\Admin\Librarys\wgesdwx\svchost.exe "C:\Users\Admin\AppData\Local\Temp\c1a4652dab20886ee5b938184653a0b2d1b95616557353cace78d415553c89bc.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Users\Admin\Librarys\wgesdwx\svchost.exeC:\Users\Admin\Librarys\wgesdwx\svchost.exe --kk3⤵
- Executes dropped EXE
PID:2072
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
166KB
MD51225cf024f08fdf7741a0f8f9aa4e017
SHA118058c507f8b6a4574405b054b8e8f7b19052d7d
SHA256c1a4652dab20886ee5b938184653a0b2d1b95616557353cace78d415553c89bc
SHA5124f76c84e1906eee5993c09d4d748c6faa9ddaeff3b4c097e8b10c20395d9ee1a7a10126a7968d37a64d28589f19df671057e3cf384cd66972e298717f4caa8c4
-
Filesize
166KB
MD51225cf024f08fdf7741a0f8f9aa4e017
SHA118058c507f8b6a4574405b054b8e8f7b19052d7d
SHA256c1a4652dab20886ee5b938184653a0b2d1b95616557353cace78d415553c89bc
SHA5124f76c84e1906eee5993c09d4d748c6faa9ddaeff3b4c097e8b10c20395d9ee1a7a10126a7968d37a64d28589f19df671057e3cf384cd66972e298717f4caa8c4
-
Filesize
166KB
MD51225cf024f08fdf7741a0f8f9aa4e017
SHA118058c507f8b6a4574405b054b8e8f7b19052d7d
SHA256c1a4652dab20886ee5b938184653a0b2d1b95616557353cace78d415553c89bc
SHA5124f76c84e1906eee5993c09d4d748c6faa9ddaeff3b4c097e8b10c20395d9ee1a7a10126a7968d37a64d28589f19df671057e3cf384cd66972e298717f4caa8c4