Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
194s -
max time network
198s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2022, 13:52
Static task
static1
Behavioral task
behavioral1
Sample
5315d00a1a08e8aa74236691025b63a4518503b0ed76ad0ce5372956d758d723.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5315d00a1a08e8aa74236691025b63a4518503b0ed76ad0ce5372956d758d723.exe
Resource
win10v2004-20220812-en
General
-
Target
5315d00a1a08e8aa74236691025b63a4518503b0ed76ad0ce5372956d758d723.exe
-
Size
205KB
-
MD5
7eae85f918986f89516fb96fee6f0f4c
-
SHA1
4e73325a601e4851a7900b3817fc2146cd347d55
-
SHA256
5315d00a1a08e8aa74236691025b63a4518503b0ed76ad0ce5372956d758d723
-
SHA512
329cd03682b7b528a2d0a83c8f673c06799c1a2fe9ba2f24aebc34a3200b1a26cbef1166245b07849237af328b8aa5e6d687f12569fa13ef901d4c3eb959b4b4
-
SSDEEP
6144:acPuit+GPqkHT2dt9dkk5UblW56qBid/T:/WigGPqVKIE8id7
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4204 carss.exe -
Loads dropped DLL 1 IoCs
pid Process 4204 carss.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\wi240602750nd.temp 5315d00a1a08e8aa74236691025b63a4518503b0ed76ad0ce5372956d758d723.exe File created C:\Program Files\Internet Explorer\carss.exe 5315d00a1a08e8aa74236691025b63a4518503b0ed76ad0ce5372956d758d723.exe File opened for modification C:\Program Files\Internet Explorer\carss.exe 5315d00a1a08e8aa74236691025b63a4518503b0ed76ad0ce5372956d758d723.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4336 5315d00a1a08e8aa74236691025b63a4518503b0ed76ad0ce5372956d758d723.exe 4336 5315d00a1a08e8aa74236691025b63a4518503b0ed76ad0ce5372956d758d723.exe 4336 5315d00a1a08e8aa74236691025b63a4518503b0ed76ad0ce5372956d758d723.exe 4336 5315d00a1a08e8aa74236691025b63a4518503b0ed76ad0ce5372956d758d723.exe 4336 5315d00a1a08e8aa74236691025b63a4518503b0ed76ad0ce5372956d758d723.exe 4336 5315d00a1a08e8aa74236691025b63a4518503b0ed76ad0ce5372956d758d723.exe 4336 5315d00a1a08e8aa74236691025b63a4518503b0ed76ad0ce5372956d758d723.exe 4336 5315d00a1a08e8aa74236691025b63a4518503b0ed76ad0ce5372956d758d723.exe 4204 carss.exe 4204 carss.exe 4204 carss.exe 4204 carss.exe 4204 carss.exe 4204 carss.exe 4204 carss.exe 4204 carss.exe 4204 carss.exe 4204 carss.exe 4204 carss.exe 4204 carss.exe 4204 carss.exe 4204 carss.exe 4204 carss.exe 4204 carss.exe 4204 carss.exe 4204 carss.exe 4204 carss.exe 4204 carss.exe 4204 carss.exe 4204 carss.exe 4204 carss.exe 4204 carss.exe 4204 carss.exe 4204 carss.exe 4204 carss.exe 4204 carss.exe 4204 carss.exe 4204 carss.exe 4204 carss.exe 4204 carss.exe 4204 carss.exe 4204 carss.exe 4204 carss.exe 4204 carss.exe 4204 carss.exe 4204 carss.exe 4204 carss.exe 4204 carss.exe 4204 carss.exe 4204 carss.exe 4204 carss.exe 4204 carss.exe 4204 carss.exe 4204 carss.exe 4204 carss.exe 4204 carss.exe 4204 carss.exe 4204 carss.exe 4204 carss.exe 4204 carss.exe 4204 carss.exe 4204 carss.exe 4204 carss.exe 4204 carss.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4336 wrote to memory of 4204 4336 5315d00a1a08e8aa74236691025b63a4518503b0ed76ad0ce5372956d758d723.exe 78 PID 4336 wrote to memory of 4204 4336 5315d00a1a08e8aa74236691025b63a4518503b0ed76ad0ce5372956d758d723.exe 78 PID 4336 wrote to memory of 4204 4336 5315d00a1a08e8aa74236691025b63a4518503b0ed76ad0ce5372956d758d723.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\5315d00a1a08e8aa74236691025b63a4518503b0ed76ad0ce5372956d758d723.exe"C:\Users\Admin\AppData\Local\Temp\5315d00a1a08e8aa74236691025b63a4518503b0ed76ad0ce5372956d758d723.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Program Files\Internet Explorer\carss.exe"C:\Program Files\Internet Explorer\carss.exe" C:\WINDOWS\Temp\hx107.tmp CodeMain2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:4204
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD5889b99c52a60dd49227c5e485a016679
SHA18fa889e456aa646a4d0a4349977430ce5fa5e2d7
SHA2566cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910
SHA51208933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641
-
Filesize
60KB
MD5889b99c52a60dd49227c5e485a016679
SHA18fa889e456aa646a4d0a4349977430ce5fa5e2d7
SHA2566cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910
SHA51208933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641
-
Filesize
20.2MB
MD5ba6a2eb5f8b5e7593727cb52d9da5ec2
SHA1dba4f7b05253c9b8183239ab7342b83d98149b4f
SHA256b4fa3e8ea6cf01b8fa571cedd19845cc9c3abedb532b51c1286a139d2f080d3e
SHA51277a26ace2a2041e3665f07b89b6aaca10041633fdbb32c79ff8d9fc68cfe6fd5bea71cbe470ca2aaec79f1fecea76872c9e13af11b0afb9b28f918196696d3b7
-
Filesize
20.2MB
MD5ba6a2eb5f8b5e7593727cb52d9da5ec2
SHA1dba4f7b05253c9b8183239ab7342b83d98149b4f
SHA256b4fa3e8ea6cf01b8fa571cedd19845cc9c3abedb532b51c1286a139d2f080d3e
SHA51277a26ace2a2041e3665f07b89b6aaca10041633fdbb32c79ff8d9fc68cfe6fd5bea71cbe470ca2aaec79f1fecea76872c9e13af11b0afb9b28f918196696d3b7