Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30/11/2022, 23:22
Static task
static1
Behavioral task
behavioral1
Sample
ae807360e83e978da8627e93811e1ca7d910ded177c1bb2f1387e11aef1bdf98.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ae807360e83e978da8627e93811e1ca7d910ded177c1bb2f1387e11aef1bdf98.exe
Resource
win10v2004-20220812-en
General
-
Target
ae807360e83e978da8627e93811e1ca7d910ded177c1bb2f1387e11aef1bdf98.exe
-
Size
375KB
-
MD5
4fe012a53f34f315e693ddf8a8a7cbb8
-
SHA1
dc38010ba1a416db24e69d745d5cbd5eec1192c5
-
SHA256
ae807360e83e978da8627e93811e1ca7d910ded177c1bb2f1387e11aef1bdf98
-
SHA512
f0a3bb9aedf1c7b3089fc6affa6ce0967c46762a783343cf1291500a339fd6d3807344bda0ce863c51a2caf26ccea4d4a8fcd07d499f6e9f2ac652d3849f67f6
-
SSDEEP
6144:8UvbxAQd6J+1i77CGTaTVEcL0Dv7isAzP5yiY2EDEtz:pKQd6Q1dGmhEcM9gz
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1680 Nj3PpiORsUHm.exe 1684 Nj3PpiORsUHm.exe -
Loads dropped DLL 4 IoCs
pid Process 1128 ae807360e83e978da8627e93811e1ca7d910ded177c1bb2f1387e11aef1bdf98.exe 1128 ae807360e83e978da8627e93811e1ca7d910ded177c1bb2f1387e11aef1bdf98.exe 1684 Nj3PpiORsUHm.exe 1684 Nj3PpiORsUHm.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run ae807360e83e978da8627e93811e1ca7d910ded177c1bb2f1387e11aef1bdf98.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\keZSrKItbqf8XI = "C:\\ProgramData\\MqW1CWM0BqU6ni7f\\Nj3PpiORsUHm.exe" ae807360e83e978da8627e93811e1ca7d910ded177c1bb2f1387e11aef1bdf98.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1032 set thread context of 1128 1032 ae807360e83e978da8627e93811e1ca7d910ded177c1bb2f1387e11aef1bdf98.exe 79 PID 1680 set thread context of 1684 1680 Nj3PpiORsUHm.exe 81 PID 1684 set thread context of 4420 1684 Nj3PpiORsUHm.exe 82 -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1032 wrote to memory of 1128 1032 ae807360e83e978da8627e93811e1ca7d910ded177c1bb2f1387e11aef1bdf98.exe 79 PID 1032 wrote to memory of 1128 1032 ae807360e83e978da8627e93811e1ca7d910ded177c1bb2f1387e11aef1bdf98.exe 79 PID 1032 wrote to memory of 1128 1032 ae807360e83e978da8627e93811e1ca7d910ded177c1bb2f1387e11aef1bdf98.exe 79 PID 1032 wrote to memory of 1128 1032 ae807360e83e978da8627e93811e1ca7d910ded177c1bb2f1387e11aef1bdf98.exe 79 PID 1032 wrote to memory of 1128 1032 ae807360e83e978da8627e93811e1ca7d910ded177c1bb2f1387e11aef1bdf98.exe 79 PID 1128 wrote to memory of 1680 1128 ae807360e83e978da8627e93811e1ca7d910ded177c1bb2f1387e11aef1bdf98.exe 80 PID 1128 wrote to memory of 1680 1128 ae807360e83e978da8627e93811e1ca7d910ded177c1bb2f1387e11aef1bdf98.exe 80 PID 1128 wrote to memory of 1680 1128 ae807360e83e978da8627e93811e1ca7d910ded177c1bb2f1387e11aef1bdf98.exe 80 PID 1680 wrote to memory of 1684 1680 Nj3PpiORsUHm.exe 81 PID 1680 wrote to memory of 1684 1680 Nj3PpiORsUHm.exe 81 PID 1680 wrote to memory of 1684 1680 Nj3PpiORsUHm.exe 81 PID 1680 wrote to memory of 1684 1680 Nj3PpiORsUHm.exe 81 PID 1680 wrote to memory of 1684 1680 Nj3PpiORsUHm.exe 81 PID 1684 wrote to memory of 4420 1684 Nj3PpiORsUHm.exe 82 PID 1684 wrote to memory of 4420 1684 Nj3PpiORsUHm.exe 82 PID 1684 wrote to memory of 4420 1684 Nj3PpiORsUHm.exe 82 PID 1684 wrote to memory of 4420 1684 Nj3PpiORsUHm.exe 82 PID 1684 wrote to memory of 4420 1684 Nj3PpiORsUHm.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\ae807360e83e978da8627e93811e1ca7d910ded177c1bb2f1387e11aef1bdf98.exe"C:\Users\Admin\AppData\Local\Temp\ae807360e83e978da8627e93811e1ca7d910ded177c1bb2f1387e11aef1bdf98.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Users\Admin\AppData\Local\Temp\ae807360e83e978da8627e93811e1ca7d910ded177c1bb2f1387e11aef1bdf98.exe"C:\Users\Admin\AppData\Local\Temp\ae807360e83e978da8627e93811e1ca7d910ded177c1bb2f1387e11aef1bdf98.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\ProgramData\MqW1CWM0BqU6ni7f\Nj3PpiORsUHm.exe"C:\ProgramData\MqW1CWM0BqU6ni7f\Nj3PpiORsUHm.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\ProgramData\MqW1CWM0BqU6ni7f\Nj3PpiORsUHm.exe"C:\ProgramData\MqW1CWM0BqU6ni7f\Nj3PpiORsUHm.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\LogTransport2.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\LogTransport2.exe" /i:16845⤵PID:4420
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
375KB
MD54fe012a53f34f315e693ddf8a8a7cbb8
SHA1dc38010ba1a416db24e69d745d5cbd5eec1192c5
SHA256ae807360e83e978da8627e93811e1ca7d910ded177c1bb2f1387e11aef1bdf98
SHA512f0a3bb9aedf1c7b3089fc6affa6ce0967c46762a783343cf1291500a339fd6d3807344bda0ce863c51a2caf26ccea4d4a8fcd07d499f6e9f2ac652d3849f67f6
-
Filesize
375KB
MD54fe012a53f34f315e693ddf8a8a7cbb8
SHA1dc38010ba1a416db24e69d745d5cbd5eec1192c5
SHA256ae807360e83e978da8627e93811e1ca7d910ded177c1bb2f1387e11aef1bdf98
SHA512f0a3bb9aedf1c7b3089fc6affa6ce0967c46762a783343cf1291500a339fd6d3807344bda0ce863c51a2caf26ccea4d4a8fcd07d499f6e9f2ac652d3849f67f6
-
Filesize
375KB
MD557c388c903ce127f1cbe47166604e241
SHA14dc9fe22b37038c66ba6a400ca506a600d25ca30
SHA2564c377ff6430394f7dc0f21f2e33ea9ef9d7ee7b081f8a2f8caff3e04b9d49d26
SHA512f09c39e62d2d5362864e0d7377e5941bb9deac8ca5fd4bedc9964f94afdcfee486678f8916a66149880c8be06e2a3c5bf028601f45cc6bee3be6f043983732a7
-
Filesize
375KB
MD557c388c903ce127f1cbe47166604e241
SHA14dc9fe22b37038c66ba6a400ca506a600d25ca30
SHA2564c377ff6430394f7dc0f21f2e33ea9ef9d7ee7b081f8a2f8caff3e04b9d49d26
SHA512f09c39e62d2d5362864e0d7377e5941bb9deac8ca5fd4bedc9964f94afdcfee486678f8916a66149880c8be06e2a3c5bf028601f45cc6bee3be6f043983732a7
-
Filesize
375KB
MD557c388c903ce127f1cbe47166604e241
SHA14dc9fe22b37038c66ba6a400ca506a600d25ca30
SHA2564c377ff6430394f7dc0f21f2e33ea9ef9d7ee7b081f8a2f8caff3e04b9d49d26
SHA512f09c39e62d2d5362864e0d7377e5941bb9deac8ca5fd4bedc9964f94afdcfee486678f8916a66149880c8be06e2a3c5bf028601f45cc6bee3be6f043983732a7
-
Filesize
375KB
MD557c388c903ce127f1cbe47166604e241
SHA14dc9fe22b37038c66ba6a400ca506a600d25ca30
SHA2564c377ff6430394f7dc0f21f2e33ea9ef9d7ee7b081f8a2f8caff3e04b9d49d26
SHA512f09c39e62d2d5362864e0d7377e5941bb9deac8ca5fd4bedc9964f94afdcfee486678f8916a66149880c8be06e2a3c5bf028601f45cc6bee3be6f043983732a7
-
Filesize
375KB
MD557c388c903ce127f1cbe47166604e241
SHA14dc9fe22b37038c66ba6a400ca506a600d25ca30
SHA2564c377ff6430394f7dc0f21f2e33ea9ef9d7ee7b081f8a2f8caff3e04b9d49d26
SHA512f09c39e62d2d5362864e0d7377e5941bb9deac8ca5fd4bedc9964f94afdcfee486678f8916a66149880c8be06e2a3c5bf028601f45cc6bee3be6f043983732a7