Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
179s -
max time network
230s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 01:16
Static task
static1
Behavioral task
behavioral1
Sample
91bea176172a4b78febc5eb65f86e9478eb7a4ae1dc8d29769896e027010d20c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
91bea176172a4b78febc5eb65f86e9478eb7a4ae1dc8d29769896e027010d20c.exe
Resource
win10v2004-20221111-en
General
-
Target
91bea176172a4b78febc5eb65f86e9478eb7a4ae1dc8d29769896e027010d20c.exe
-
Size
411KB
-
MD5
5e0a2d63cea7b82a5ceff00165a1bae0
-
SHA1
f04205570d7175ad3fc61d4165375373b9dc5fc7
-
SHA256
91bea176172a4b78febc5eb65f86e9478eb7a4ae1dc8d29769896e027010d20c
-
SHA512
5bc0e5ad629e20e042e9d7fd1658fe7f558d00c3068acd3ccd56ceebf9eb356cef2ca0b7cad4fe69c018c6aa73618a86909e56a31dd6bea57c370ddc361e8324
-
SSDEEP
6144:9GK72pGPiE1aVtXTTHhWs4bWADaevZ+zDSv67kYoWI8:9pTDcV7Wfb3jAG679oh
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3588 YtlCNH0y9.exe 3172 YtlCNH0y9.exe -
Loads dropped DLL 4 IoCs
pid Process 3144 91bea176172a4b78febc5eb65f86e9478eb7a4ae1dc8d29769896e027010d20c.exe 3144 91bea176172a4b78febc5eb65f86e9478eb7a4ae1dc8d29769896e027010d20c.exe 3172 YtlCNH0y9.exe 3172 YtlCNH0y9.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows\CurrentVersion\Run 91bea176172a4b78febc5eb65f86e9478eb7a4ae1dc8d29769896e027010d20c.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\B8xBhrrEhW = "C:\\ProgramData\\UYBJdZ6K8eOX\\YtlCNH0y9.exe" 91bea176172a4b78febc5eb65f86e9478eb7a4ae1dc8d29769896e027010d20c.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3332 set thread context of 3144 3332 91bea176172a4b78febc5eb65f86e9478eb7a4ae1dc8d29769896e027010d20c.exe 82 PID 3588 set thread context of 3172 3588 YtlCNH0y9.exe 86 PID 3172 set thread context of 1740 3172 YtlCNH0y9.exe 91 -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 3332 wrote to memory of 3144 3332 91bea176172a4b78febc5eb65f86e9478eb7a4ae1dc8d29769896e027010d20c.exe 82 PID 3332 wrote to memory of 3144 3332 91bea176172a4b78febc5eb65f86e9478eb7a4ae1dc8d29769896e027010d20c.exe 82 PID 3332 wrote to memory of 3144 3332 91bea176172a4b78febc5eb65f86e9478eb7a4ae1dc8d29769896e027010d20c.exe 82 PID 3332 wrote to memory of 3144 3332 91bea176172a4b78febc5eb65f86e9478eb7a4ae1dc8d29769896e027010d20c.exe 82 PID 3332 wrote to memory of 3144 3332 91bea176172a4b78febc5eb65f86e9478eb7a4ae1dc8d29769896e027010d20c.exe 82 PID 3144 wrote to memory of 3588 3144 91bea176172a4b78febc5eb65f86e9478eb7a4ae1dc8d29769896e027010d20c.exe 85 PID 3144 wrote to memory of 3588 3144 91bea176172a4b78febc5eb65f86e9478eb7a4ae1dc8d29769896e027010d20c.exe 85 PID 3144 wrote to memory of 3588 3144 91bea176172a4b78febc5eb65f86e9478eb7a4ae1dc8d29769896e027010d20c.exe 85 PID 3588 wrote to memory of 3172 3588 YtlCNH0y9.exe 86 PID 3588 wrote to memory of 3172 3588 YtlCNH0y9.exe 86 PID 3588 wrote to memory of 3172 3588 YtlCNH0y9.exe 86 PID 3588 wrote to memory of 3172 3588 YtlCNH0y9.exe 86 PID 3588 wrote to memory of 3172 3588 YtlCNH0y9.exe 86 PID 3172 wrote to memory of 3672 3172 YtlCNH0y9.exe 88 PID 3172 wrote to memory of 3672 3172 YtlCNH0y9.exe 88 PID 3172 wrote to memory of 3672 3172 YtlCNH0y9.exe 88 PID 3172 wrote to memory of 1740 3172 YtlCNH0y9.exe 91 PID 3172 wrote to memory of 1740 3172 YtlCNH0y9.exe 91 PID 3172 wrote to memory of 1740 3172 YtlCNH0y9.exe 91 PID 3172 wrote to memory of 1740 3172 YtlCNH0y9.exe 91 PID 3172 wrote to memory of 1740 3172 YtlCNH0y9.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\91bea176172a4b78febc5eb65f86e9478eb7a4ae1dc8d29769896e027010d20c.exe"C:\Users\Admin\AppData\Local\Temp\91bea176172a4b78febc5eb65f86e9478eb7a4ae1dc8d29769896e027010d20c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3332 -
C:\Users\Admin\AppData\Local\Temp\91bea176172a4b78febc5eb65f86e9478eb7a4ae1dc8d29769896e027010d20c.exe"C:\Users\Admin\AppData\Local\Temp\91bea176172a4b78febc5eb65f86e9478eb7a4ae1dc8d29769896e027010d20c.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\ProgramData\UYBJdZ6K8eOX\YtlCNH0y9.exe"C:\ProgramData\UYBJdZ6K8eOX\YtlCNH0y9.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\ProgramData\UYBJdZ6K8eOX\YtlCNH0y9.exe"C:\ProgramData\UYBJdZ6K8eOX\YtlCNH0y9.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.169.31\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.169.31\MicrosoftEdgeUpdate.exe" /i:31725⤵PID:3672
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AdobeCollabSync.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AdobeCollabSync.exe" /i:31725⤵PID:1740
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
411KB
MD55e0a2d63cea7b82a5ceff00165a1bae0
SHA1f04205570d7175ad3fc61d4165375373b9dc5fc7
SHA25691bea176172a4b78febc5eb65f86e9478eb7a4ae1dc8d29769896e027010d20c
SHA5125bc0e5ad629e20e042e9d7fd1658fe7f558d00c3068acd3ccd56ceebf9eb356cef2ca0b7cad4fe69c018c6aa73618a86909e56a31dd6bea57c370ddc361e8324
-
Filesize
411KB
MD55e0a2d63cea7b82a5ceff00165a1bae0
SHA1f04205570d7175ad3fc61d4165375373b9dc5fc7
SHA25691bea176172a4b78febc5eb65f86e9478eb7a4ae1dc8d29769896e027010d20c
SHA5125bc0e5ad629e20e042e9d7fd1658fe7f558d00c3068acd3ccd56ceebf9eb356cef2ca0b7cad4fe69c018c6aa73618a86909e56a31dd6bea57c370ddc361e8324
-
Filesize
411KB
MD506ef04ff85c6addd4f598f39a26a79a1
SHA13217260187e815f54e0ca31912dce14cf2f9110b
SHA2568c3232f96053c7601ee539e8ee3fa72fd448aa83a26dc954a1bc0f670160a2c4
SHA5128e7fabd7260428e3030a4389a50170fe409f3000b588c82df28b5ba4d2cb208105836cf533ae01ace4ad3c4a4198cadd4c41d227d4e8e4d5765f163be3ac7975
-
Filesize
411KB
MD506ef04ff85c6addd4f598f39a26a79a1
SHA13217260187e815f54e0ca31912dce14cf2f9110b
SHA2568c3232f96053c7601ee539e8ee3fa72fd448aa83a26dc954a1bc0f670160a2c4
SHA5128e7fabd7260428e3030a4389a50170fe409f3000b588c82df28b5ba4d2cb208105836cf533ae01ace4ad3c4a4198cadd4c41d227d4e8e4d5765f163be3ac7975
-
Filesize
411KB
MD506ef04ff85c6addd4f598f39a26a79a1
SHA13217260187e815f54e0ca31912dce14cf2f9110b
SHA2568c3232f96053c7601ee539e8ee3fa72fd448aa83a26dc954a1bc0f670160a2c4
SHA5128e7fabd7260428e3030a4389a50170fe409f3000b588c82df28b5ba4d2cb208105836cf533ae01ace4ad3c4a4198cadd4c41d227d4e8e4d5765f163be3ac7975
-
Filesize
411KB
MD506ef04ff85c6addd4f598f39a26a79a1
SHA13217260187e815f54e0ca31912dce14cf2f9110b
SHA2568c3232f96053c7601ee539e8ee3fa72fd448aa83a26dc954a1bc0f670160a2c4
SHA5128e7fabd7260428e3030a4389a50170fe409f3000b588c82df28b5ba4d2cb208105836cf533ae01ace4ad3c4a4198cadd4c41d227d4e8e4d5765f163be3ac7975
-
Filesize
411KB
MD506ef04ff85c6addd4f598f39a26a79a1
SHA13217260187e815f54e0ca31912dce14cf2f9110b
SHA2568c3232f96053c7601ee539e8ee3fa72fd448aa83a26dc954a1bc0f670160a2c4
SHA5128e7fabd7260428e3030a4389a50170fe409f3000b588c82df28b5ba4d2cb208105836cf533ae01ace4ad3c4a4198cadd4c41d227d4e8e4d5765f163be3ac7975