Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
173s -
max time network
208s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
24/11/2022, 07:23
Behavioral task
behavioral1
Sample
0f212b57e2233a19c2d89a4fffdbbf0d.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
0f212b57e2233a19c2d89a4fffdbbf0d.exe
Resource
win10v2004-20221111-en
General
-
Target
0f212b57e2233a19c2d89a4fffdbbf0d.exe
-
Size
6.7MB
-
MD5
0f212b57e2233a19c2d89a4fffdbbf0d
-
SHA1
8f720fd2be5a828ceadf94d0ed25fa45c7016af2
-
SHA256
1fd5182fa9faea228d4e3850c8a3e6f2de458f61d19a907abe4ecf8a3fe8b893
-
SHA512
8dddbe3f80f1efa59a51e75d878a86a2f2423618fd3c8606ef0ab5da571ae9320411007249133eda524446c4ffa2dd02f6f767a78cd51869a854129bc9ac5e66
-
SSDEEP
98304:WYp0c8cNCsWVL4sCbO7xTnWgMG/158lKCkZ1XsDJFw7SFEk+JosO6uvSt:WYp1NgVL4HK00XcJFJFEkoos/uY
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1088 adb.exe 3356 adb.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1888 0f212b57e2233a19c2d89a4fffdbbf0d.exe 1888 0f212b57e2233a19c2d89a4fffdbbf0d.exe 3356 adb.exe 3356 adb.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1888 0f212b57e2233a19c2d89a4fffdbbf0d.exe 1888 0f212b57e2233a19c2d89a4fffdbbf0d.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1888 0f212b57e2233a19c2d89a4fffdbbf0d.exe 1888 0f212b57e2233a19c2d89a4fffdbbf0d.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1888 0f212b57e2233a19c2d89a4fffdbbf0d.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1888 wrote to memory of 2720 1888 0f212b57e2233a19c2d89a4fffdbbf0d.exe 85 PID 1888 wrote to memory of 2720 1888 0f212b57e2233a19c2d89a4fffdbbf0d.exe 85 PID 1888 wrote to memory of 2720 1888 0f212b57e2233a19c2d89a4fffdbbf0d.exe 85 PID 2720 wrote to memory of 1088 2720 cmd.exe 87 PID 2720 wrote to memory of 1088 2720 cmd.exe 87 PID 2720 wrote to memory of 1088 2720 cmd.exe 87 PID 1088 wrote to memory of 3356 1088 adb.exe 89 PID 1088 wrote to memory of 3356 1088 adb.exe 89 PID 1088 wrote to memory of 3356 1088 adb.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f212b57e2233a19c2d89a4fffdbbf0d.exe"C:\Users\Admin\AppData\Local\Temp\0f212b57e2233a19c2d89a4fffdbbf0d.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\SysWOW64\cmd.execmd.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Users\Admin\Documents\TvBox\adb.exeadb start-server3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Users\Admin\Documents\TvBox\adb.exeadb fork-server server4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3356
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
667KB
MD5d7771aa7dd449cf32ca21beb168dc866
SHA1dad0ab3f42164dc19828eb35b2f2aa10de001287
SHA256bf23564e38c09a06118b907b426fbfc1fa041926e09da00a8d9010d14fb986e1
SHA512d3720b3a5db7f8cc0a2a430fdd525ec2847852e306cd598ffa784132bdf1109650dd91ab206acc5c9ede6c62cfe0b918a950c657618c3c9060411b7f10b866c1
-
Filesize
667KB
MD5d7771aa7dd449cf32ca21beb168dc866
SHA1dad0ab3f42164dc19828eb35b2f2aa10de001287
SHA256bf23564e38c09a06118b907b426fbfc1fa041926e09da00a8d9010d14fb986e1
SHA512d3720b3a5db7f8cc0a2a430fdd525ec2847852e306cd598ffa784132bdf1109650dd91ab206acc5c9ede6c62cfe0b918a950c657618c3c9060411b7f10b866c1
-
Filesize
667KB
MD5d7771aa7dd449cf32ca21beb168dc866
SHA1dad0ab3f42164dc19828eb35b2f2aa10de001287
SHA256bf23564e38c09a06118b907b426fbfc1fa041926e09da00a8d9010d14fb986e1
SHA512d3720b3a5db7f8cc0a2a430fdd525ec2847852e306cd598ffa784132bdf1109650dd91ab206acc5c9ede6c62cfe0b918a950c657618c3c9060411b7f10b866c1