Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
274s -
max time network
292s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2022, 08:57
Static task
static1
Behavioral task
behavioral1
Sample
58c5110fd8c362c2838781ac803169194d3df3ba70be598b959ce26be2e8a674.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
58c5110fd8c362c2838781ac803169194d3df3ba70be598b959ce26be2e8a674.exe
Resource
win10v2004-20221111-en
General
-
Target
58c5110fd8c362c2838781ac803169194d3df3ba70be598b959ce26be2e8a674.exe
-
Size
48KB
-
MD5
7f95621f4ec5b49d2f29bb22e4e875eb
-
SHA1
201da1257f822c09ca57ac8140c25b4687eccfc1
-
SHA256
58c5110fd8c362c2838781ac803169194d3df3ba70be598b959ce26be2e8a674
-
SHA512
8ac7813b72fde30034a7a18b721d756ad1317524273de03c6d8103c2113f334f006c409eeb67a5ddd7272be80a4fe4736748883ef164b0af2ae19a0aa5540f21
-
SSDEEP
768:1YFJYoniX5QZaq44debqo+zIXX+HlplaClU8gPu/bdrf:1YFRniSZeCebq/lplFl/+uxr
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Windows\CurrentVersion\Run 58c5110fd8c362c2838781ac803169194d3df3ba70be598b959ce26be2e8a674.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fvvrhhd = "C:\\Windows\\system32\\75i75u7.exe" 58c5110fd8c362c2838781ac803169194d3df3ba70be598b959ce26be2e8a674.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\75i75u7.exe 58c5110fd8c362c2838781ac803169194d3df3ba70be598b959ce26be2e8a674.exe File opened for modification C:\Windows\SysWOW64\75i75u7.exe 58c5110fd8c362c2838781ac803169194d3df3ba70be598b959ce26be2e8a674.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3528 set thread context of 4020 3528 58c5110fd8c362c2838781ac803169194d3df3ba70be598b959ce26be2e8a674.exe 81 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4020 58c5110fd8c362c2838781ac803169194d3df3ba70be598b959ce26be2e8a674.exe 4020 58c5110fd8c362c2838781ac803169194d3df3ba70be598b959ce26be2e8a674.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3528 wrote to memory of 4020 3528 58c5110fd8c362c2838781ac803169194d3df3ba70be598b959ce26be2e8a674.exe 81 PID 3528 wrote to memory of 4020 3528 58c5110fd8c362c2838781ac803169194d3df3ba70be598b959ce26be2e8a674.exe 81 PID 3528 wrote to memory of 4020 3528 58c5110fd8c362c2838781ac803169194d3df3ba70be598b959ce26be2e8a674.exe 81 PID 3528 wrote to memory of 4020 3528 58c5110fd8c362c2838781ac803169194d3df3ba70be598b959ce26be2e8a674.exe 81 PID 3528 wrote to memory of 4020 3528 58c5110fd8c362c2838781ac803169194d3df3ba70be598b959ce26be2e8a674.exe 81 PID 4020 wrote to memory of 1936 4020 58c5110fd8c362c2838781ac803169194d3df3ba70be598b959ce26be2e8a674.exe 39 PID 4020 wrote to memory of 1936 4020 58c5110fd8c362c2838781ac803169194d3df3ba70be598b959ce26be2e8a674.exe 39 PID 4020 wrote to memory of 1936 4020 58c5110fd8c362c2838781ac803169194d3df3ba70be598b959ce26be2e8a674.exe 39
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1936
-
C:\Users\Admin\AppData\Local\Temp\58c5110fd8c362c2838781ac803169194d3df3ba70be598b959ce26be2e8a674.exe"C:\Users\Admin\AppData\Local\Temp\58c5110fd8c362c2838781ac803169194d3df3ba70be598b959ce26be2e8a674.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Users\Admin\AppData\Local\Temp\58c5110fd8c362c2838781ac803169194d3df3ba70be598b959ce26be2e8a674.exe"C:\Users\Admin\AppData\Local\Temp\58c5110fd8c362c2838781ac803169194d3df3ba70be598b959ce26be2e8a674.exe"3⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4020
-
-