Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
346s -
max time network
416s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 03:32
Static task
static1
Behavioral task
behavioral1
Sample
730243200dcf1c2bb4af6de8cc6714ec18e0953552558ab2f16f9f5333d10a7e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
730243200dcf1c2bb4af6de8cc6714ec18e0953552558ab2f16f9f5333d10a7e.exe
Resource
win10v2004-20221111-en
General
-
Target
730243200dcf1c2bb4af6de8cc6714ec18e0953552558ab2f16f9f5333d10a7e.exe
-
Size
454KB
-
MD5
4ed3ce2511f5c6aa47e9d24add6bed61
-
SHA1
7ad0e32073ae935a26a7f2619581a5c0295a6ddb
-
SHA256
730243200dcf1c2bb4af6de8cc6714ec18e0953552558ab2f16f9f5333d10a7e
-
SHA512
8a056eec53346ad45b48eea2c9349f821aa0cb692d79772f14270a30d21b9fa18fdffedace436be70d21e658017d057810e954561b79ffef9ac72b9f204fb531
-
SSDEEP
6144:o2Kgo6ZWWeT0v1hX9ExB7xAybCBxm6Dn9zonpOiqHZOGMu6wEe3:o96ZWWx237+ybGNonppyZOGMRwEe
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1320 hhA8LxhiFDp1HUy0.exe 4064 hhA8LxhiFDp1HUy0.exe -
Loads dropped DLL 4 IoCs
pid Process 2728 730243200dcf1c2bb4af6de8cc6714ec18e0953552558ab2f16f9f5333d10a7e.exe 2728 730243200dcf1c2bb4af6de8cc6714ec18e0953552558ab2f16f9f5333d10a7e.exe 4064 hhA8LxhiFDp1HUy0.exe 4064 hhA8LxhiFDp1HUy0.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\N9hnMsxYA = "C:\\ProgramData\\pCBA38w3Jc\\hhA8LxhiFDp1HUy0.exe" 730243200dcf1c2bb4af6de8cc6714ec18e0953552558ab2f16f9f5333d10a7e.exe Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Windows\CurrentVersion\Run 730243200dcf1c2bb4af6de8cc6714ec18e0953552558ab2f16f9f5333d10a7e.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2692 set thread context of 2728 2692 730243200dcf1c2bb4af6de8cc6714ec18e0953552558ab2f16f9f5333d10a7e.exe 81 PID 1320 set thread context of 4064 1320 hhA8LxhiFDp1HUy0.exe 84 -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2692 wrote to memory of 2728 2692 730243200dcf1c2bb4af6de8cc6714ec18e0953552558ab2f16f9f5333d10a7e.exe 81 PID 2692 wrote to memory of 2728 2692 730243200dcf1c2bb4af6de8cc6714ec18e0953552558ab2f16f9f5333d10a7e.exe 81 PID 2692 wrote to memory of 2728 2692 730243200dcf1c2bb4af6de8cc6714ec18e0953552558ab2f16f9f5333d10a7e.exe 81 PID 2692 wrote to memory of 2728 2692 730243200dcf1c2bb4af6de8cc6714ec18e0953552558ab2f16f9f5333d10a7e.exe 81 PID 2692 wrote to memory of 2728 2692 730243200dcf1c2bb4af6de8cc6714ec18e0953552558ab2f16f9f5333d10a7e.exe 81 PID 2728 wrote to memory of 1320 2728 730243200dcf1c2bb4af6de8cc6714ec18e0953552558ab2f16f9f5333d10a7e.exe 83 PID 2728 wrote to memory of 1320 2728 730243200dcf1c2bb4af6de8cc6714ec18e0953552558ab2f16f9f5333d10a7e.exe 83 PID 2728 wrote to memory of 1320 2728 730243200dcf1c2bb4af6de8cc6714ec18e0953552558ab2f16f9f5333d10a7e.exe 83 PID 1320 wrote to memory of 4064 1320 hhA8LxhiFDp1HUy0.exe 84 PID 1320 wrote to memory of 4064 1320 hhA8LxhiFDp1HUy0.exe 84 PID 1320 wrote to memory of 4064 1320 hhA8LxhiFDp1HUy0.exe 84 PID 1320 wrote to memory of 4064 1320 hhA8LxhiFDp1HUy0.exe 84 PID 1320 wrote to memory of 4064 1320 hhA8LxhiFDp1HUy0.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\730243200dcf1c2bb4af6de8cc6714ec18e0953552558ab2f16f9f5333d10a7e.exe"C:\Users\Admin\AppData\Local\Temp\730243200dcf1c2bb4af6de8cc6714ec18e0953552558ab2f16f9f5333d10a7e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\730243200dcf1c2bb4af6de8cc6714ec18e0953552558ab2f16f9f5333d10a7e.exe"C:\Users\Admin\AppData\Local\Temp\730243200dcf1c2bb4af6de8cc6714ec18e0953552558ab2f16f9f5333d10a7e.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\ProgramData\pCBA38w3Jc\hhA8LxhiFDp1HUy0.exe"C:\ProgramData\pCBA38w3Jc\hhA8LxhiFDp1HUy0.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\ProgramData\pCBA38w3Jc\hhA8LxhiFDp1HUy0.exe"C:\ProgramData\pCBA38w3Jc\hhA8LxhiFDp1HUy0.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4064
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
454KB
MD567edebecbcece0e1cebb8acab9bce460
SHA110618d49b9bbbea065e81c3c85f730dba050f124
SHA256e7844d2d748a6c3c69b5c97655583b0c5f44f995fdb2254d4f5c25b9a1bf5173
SHA512fd212ca079291814f263a6b8138de9acb42b8dc10e60c3543be69f170dcaea444ed892e0d4cab8893e04ef17d5e87f5c4c173d51abe37ede291ac6f507b1d7c2
-
Filesize
454KB
MD567edebecbcece0e1cebb8acab9bce460
SHA110618d49b9bbbea065e81c3c85f730dba050f124
SHA256e7844d2d748a6c3c69b5c97655583b0c5f44f995fdb2254d4f5c25b9a1bf5173
SHA512fd212ca079291814f263a6b8138de9acb42b8dc10e60c3543be69f170dcaea444ed892e0d4cab8893e04ef17d5e87f5c4c173d51abe37ede291ac6f507b1d7c2
-
Filesize
454KB
MD567edebecbcece0e1cebb8acab9bce460
SHA110618d49b9bbbea065e81c3c85f730dba050f124
SHA256e7844d2d748a6c3c69b5c97655583b0c5f44f995fdb2254d4f5c25b9a1bf5173
SHA512fd212ca079291814f263a6b8138de9acb42b8dc10e60c3543be69f170dcaea444ed892e0d4cab8893e04ef17d5e87f5c4c173d51abe37ede291ac6f507b1d7c2
-
Filesize
454KB
MD54ed3ce2511f5c6aa47e9d24add6bed61
SHA17ad0e32073ae935a26a7f2619581a5c0295a6ddb
SHA256730243200dcf1c2bb4af6de8cc6714ec18e0953552558ab2f16f9f5333d10a7e
SHA5128a056eec53346ad45b48eea2c9349f821aa0cb692d79772f14270a30d21b9fa18fdffedace436be70d21e658017d057810e954561b79ffef9ac72b9f204fb531
-
Filesize
454KB
MD54ed3ce2511f5c6aa47e9d24add6bed61
SHA17ad0e32073ae935a26a7f2619581a5c0295a6ddb
SHA256730243200dcf1c2bb4af6de8cc6714ec18e0953552558ab2f16f9f5333d10a7e
SHA5128a056eec53346ad45b48eea2c9349f821aa0cb692d79772f14270a30d21b9fa18fdffedace436be70d21e658017d057810e954561b79ffef9ac72b9f204fb531
-
Filesize
454KB
MD567edebecbcece0e1cebb8acab9bce460
SHA110618d49b9bbbea065e81c3c85f730dba050f124
SHA256e7844d2d748a6c3c69b5c97655583b0c5f44f995fdb2254d4f5c25b9a1bf5173
SHA512fd212ca079291814f263a6b8138de9acb42b8dc10e60c3543be69f170dcaea444ed892e0d4cab8893e04ef17d5e87f5c4c173d51abe37ede291ac6f507b1d7c2
-
Filesize
454KB
MD567edebecbcece0e1cebb8acab9bce460
SHA110618d49b9bbbea065e81c3c85f730dba050f124
SHA256e7844d2d748a6c3c69b5c97655583b0c5f44f995fdb2254d4f5c25b9a1bf5173
SHA512fd212ca079291814f263a6b8138de9acb42b8dc10e60c3543be69f170dcaea444ed892e0d4cab8893e04ef17d5e87f5c4c173d51abe37ede291ac6f507b1d7c2