Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    179s
  • max time network
    230s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/12/2022, 01:16

General

  • Target

    91bea176172a4b78febc5eb65f86e9478eb7a4ae1dc8d29769896e027010d20c.exe

  • Size

    411KB

  • MD5

    5e0a2d63cea7b82a5ceff00165a1bae0

  • SHA1

    f04205570d7175ad3fc61d4165375373b9dc5fc7

  • SHA256

    91bea176172a4b78febc5eb65f86e9478eb7a4ae1dc8d29769896e027010d20c

  • SHA512

    5bc0e5ad629e20e042e9d7fd1658fe7f558d00c3068acd3ccd56ceebf9eb356cef2ca0b7cad4fe69c018c6aa73618a86909e56a31dd6bea57c370ddc361e8324

  • SSDEEP

    6144:9GK72pGPiE1aVtXTTHhWs4bWADaevZ+zDSv67kYoWI8:9pTDcV7Wfb3jAG679oh

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\91bea176172a4b78febc5eb65f86e9478eb7a4ae1dc8d29769896e027010d20c.exe
    "C:\Users\Admin\AppData\Local\Temp\91bea176172a4b78febc5eb65f86e9478eb7a4ae1dc8d29769896e027010d20c.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3332
    • C:\Users\Admin\AppData\Local\Temp\91bea176172a4b78febc5eb65f86e9478eb7a4ae1dc8d29769896e027010d20c.exe
      "C:\Users\Admin\AppData\Local\Temp\91bea176172a4b78febc5eb65f86e9478eb7a4ae1dc8d29769896e027010d20c.exe"
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3144
      • C:\ProgramData\UYBJdZ6K8eOX\YtlCNH0y9.exe
        "C:\ProgramData\UYBJdZ6K8eOX\YtlCNH0y9.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:3588
        • C:\ProgramData\UYBJdZ6K8eOX\YtlCNH0y9.exe
          "C:\ProgramData\UYBJdZ6K8eOX\YtlCNH0y9.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:3172
          • C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.169.31\MicrosoftEdgeUpdate.exe
            "C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.169.31\MicrosoftEdgeUpdate.exe" /i:3172
            5⤵
              PID:3672
            • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AdobeCollabSync.exe
              "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AdobeCollabSync.exe" /i:3172
              5⤵
                PID:1740

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\ProgramData\UYBJdZ6K8eOX\YtlCNH0y9.exe

        Filesize

        411KB

        MD5

        5e0a2d63cea7b82a5ceff00165a1bae0

        SHA1

        f04205570d7175ad3fc61d4165375373b9dc5fc7

        SHA256

        91bea176172a4b78febc5eb65f86e9478eb7a4ae1dc8d29769896e027010d20c

        SHA512

        5bc0e5ad629e20e042e9d7fd1658fe7f558d00c3068acd3ccd56ceebf9eb356cef2ca0b7cad4fe69c018c6aa73618a86909e56a31dd6bea57c370ddc361e8324

      • C:\ProgramData\UYBJdZ6K8eOX\YtlCNH0y9.exe

        Filesize

        411KB

        MD5

        5e0a2d63cea7b82a5ceff00165a1bae0

        SHA1

        f04205570d7175ad3fc61d4165375373b9dc5fc7

        SHA256

        91bea176172a4b78febc5eb65f86e9478eb7a4ae1dc8d29769896e027010d20c

        SHA512

        5bc0e5ad629e20e042e9d7fd1658fe7f558d00c3068acd3ccd56ceebf9eb356cef2ca0b7cad4fe69c018c6aa73618a86909e56a31dd6bea57c370ddc361e8324

      • C:\ProgramData\UYBJdZ6K8eOX\YtlCNH0y9.exe

        Filesize

        411KB

        MD5

        06ef04ff85c6addd4f598f39a26a79a1

        SHA1

        3217260187e815f54e0ca31912dce14cf2f9110b

        SHA256

        8c3232f96053c7601ee539e8ee3fa72fd448aa83a26dc954a1bc0f670160a2c4

        SHA512

        8e7fabd7260428e3030a4389a50170fe409f3000b588c82df28b5ba4d2cb208105836cf533ae01ace4ad3c4a4198cadd4c41d227d4e8e4d5765f163be3ac7975

      • C:\ProgramData\UYBJdZ6K8eOX\YtlCNH0y9.exe

        Filesize

        411KB

        MD5

        06ef04ff85c6addd4f598f39a26a79a1

        SHA1

        3217260187e815f54e0ca31912dce14cf2f9110b

        SHA256

        8c3232f96053c7601ee539e8ee3fa72fd448aa83a26dc954a1bc0f670160a2c4

        SHA512

        8e7fabd7260428e3030a4389a50170fe409f3000b588c82df28b5ba4d2cb208105836cf533ae01ace4ad3c4a4198cadd4c41d227d4e8e4d5765f163be3ac7975

      • C:\ProgramData\UYBJdZ6K8eOX\YtlCNH0y9.exe

        Filesize

        411KB

        MD5

        06ef04ff85c6addd4f598f39a26a79a1

        SHA1

        3217260187e815f54e0ca31912dce14cf2f9110b

        SHA256

        8c3232f96053c7601ee539e8ee3fa72fd448aa83a26dc954a1bc0f670160a2c4

        SHA512

        8e7fabd7260428e3030a4389a50170fe409f3000b588c82df28b5ba4d2cb208105836cf533ae01ace4ad3c4a4198cadd4c41d227d4e8e4d5765f163be3ac7975

      • C:\Users\Admin\AppData\Local\Temp\AxG32QwcMT0.exe

        Filesize

        411KB

        MD5

        06ef04ff85c6addd4f598f39a26a79a1

        SHA1

        3217260187e815f54e0ca31912dce14cf2f9110b

        SHA256

        8c3232f96053c7601ee539e8ee3fa72fd448aa83a26dc954a1bc0f670160a2c4

        SHA512

        8e7fabd7260428e3030a4389a50170fe409f3000b588c82df28b5ba4d2cb208105836cf533ae01ace4ad3c4a4198cadd4c41d227d4e8e4d5765f163be3ac7975

      • C:\Users\Admin\AppData\Local\Temp\AxG32QwcMT0.exe

        Filesize

        411KB

        MD5

        06ef04ff85c6addd4f598f39a26a79a1

        SHA1

        3217260187e815f54e0ca31912dce14cf2f9110b

        SHA256

        8c3232f96053c7601ee539e8ee3fa72fd448aa83a26dc954a1bc0f670160a2c4

        SHA512

        8e7fabd7260428e3030a4389a50170fe409f3000b588c82df28b5ba4d2cb208105836cf533ae01ace4ad3c4a4198cadd4c41d227d4e8e4d5765f163be3ac7975

      • memory/1740-159-0x0000000000400000-0x000000000045E000-memory.dmp

        Filesize

        376KB

      • memory/3144-133-0x0000000000400000-0x000000000045E000-memory.dmp

        Filesize

        376KB

      • memory/3144-142-0x0000000000400000-0x000000000045E000-memory.dmp

        Filesize

        376KB

      • memory/3144-136-0x0000000000400000-0x000000000045E000-memory.dmp

        Filesize

        376KB

      • memory/3144-134-0x0000000000400000-0x000000000045E000-memory.dmp

        Filesize

        376KB

      • memory/3144-135-0x0000000000400000-0x000000000045E000-memory.dmp

        Filesize

        376KB

      • memory/3172-150-0x0000000000400000-0x000000000045E000-memory.dmp

        Filesize

        376KB

      • memory/3172-151-0x0000000000400000-0x000000000045E000-memory.dmp

        Filesize

        376KB

      • memory/3172-158-0x0000000000400000-0x000000000045E000-memory.dmp

        Filesize

        376KB