Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
155s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2022, 14:34
Static task
static1
Behavioral task
behavioral1
Sample
320f5ef2011f6a2f36dff4ac3a840ee820a4881fcb77764d3f0133de0f5f1187.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
320f5ef2011f6a2f36dff4ac3a840ee820a4881fcb77764d3f0133de0f5f1187.exe
Resource
win10v2004-20220812-en
General
-
Target
320f5ef2011f6a2f36dff4ac3a840ee820a4881fcb77764d3f0133de0f5f1187.exe
-
Size
40KB
-
MD5
024ad44d546f59f6759608cbdd4ec650
-
SHA1
aa791674280b5861f6891629be6ea008ef78af1c
-
SHA256
320f5ef2011f6a2f36dff4ac3a840ee820a4881fcb77764d3f0133de0f5f1187
-
SHA512
008722b798f9d2d43ed7cec5e3c1f3de5988e1933321c6ee227a3b2b609cc4d997633a22c2ad3b26ed669bcc5b973c45b12501878885723ec671ec3580bed788
-
SSDEEP
384:K7WeoSFw/ISCKsZlVVBWs4kYA9H1gancd/awMBzvlU+5u1tGg3Kj2OdBNS:K7WeoSFpBZlV1t9HgVHIvlF2ajPBN
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 320f5ef2011f6a2f36dff4ac3a840ee820a4881fcb77764d3f0133de0f5f1187.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 320f5ef2011f6a2f36dff4ac3a840ee820a4881fcb77764d3f0133de0f5f1187.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4920 set thread context of 4852 4920 320f5ef2011f6a2f36dff4ac3a840ee820a4881fcb77764d3f0133de0f5f1187.exe 81 -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4920 320f5ef2011f6a2f36dff4ac3a840ee820a4881fcb77764d3f0133de0f5f1187.exe 4852 320f5ef2011f6a2f36dff4ac3a840ee820a4881fcb77764d3f0133de0f5f1187.exe 4852 320f5ef2011f6a2f36dff4ac3a840ee820a4881fcb77764d3f0133de0f5f1187.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4920 wrote to memory of 4852 4920 320f5ef2011f6a2f36dff4ac3a840ee820a4881fcb77764d3f0133de0f5f1187.exe 81 PID 4920 wrote to memory of 4852 4920 320f5ef2011f6a2f36dff4ac3a840ee820a4881fcb77764d3f0133de0f5f1187.exe 81 PID 4920 wrote to memory of 4852 4920 320f5ef2011f6a2f36dff4ac3a840ee820a4881fcb77764d3f0133de0f5f1187.exe 81 PID 4920 wrote to memory of 4852 4920 320f5ef2011f6a2f36dff4ac3a840ee820a4881fcb77764d3f0133de0f5f1187.exe 81 PID 4920 wrote to memory of 4852 4920 320f5ef2011f6a2f36dff4ac3a840ee820a4881fcb77764d3f0133de0f5f1187.exe 81 PID 4920 wrote to memory of 4852 4920 320f5ef2011f6a2f36dff4ac3a840ee820a4881fcb77764d3f0133de0f5f1187.exe 81 PID 4920 wrote to memory of 4852 4920 320f5ef2011f6a2f36dff4ac3a840ee820a4881fcb77764d3f0133de0f5f1187.exe 81 PID 4920 wrote to memory of 4852 4920 320f5ef2011f6a2f36dff4ac3a840ee820a4881fcb77764d3f0133de0f5f1187.exe 81 PID 4920 wrote to memory of 4852 4920 320f5ef2011f6a2f36dff4ac3a840ee820a4881fcb77764d3f0133de0f5f1187.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\320f5ef2011f6a2f36dff4ac3a840ee820a4881fcb77764d3f0133de0f5f1187.exe"C:\Users\Admin\AppData\Local\Temp\320f5ef2011f6a2f36dff4ac3a840ee820a4881fcb77764d3f0133de0f5f1187.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Users\Admin\AppData\Local\Temp\320f5ef2011f6a2f36dff4ac3a840ee820a4881fcb77764d3f0133de0f5f1187.exee|2⤵
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
PID:4852
-