Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    162s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/12/2022, 04:12

General

  • Target

    66674b58fcd2f2ba45bc0ce7ede7d78c0f811808ba7c837c882a2b9e487edaff.exe

  • Size

    375KB

  • MD5

    8378b2f4882a9b61e019940785026797

  • SHA1

    c2f3f68f5749fd1a82de626e2f07d15ba73ba200

  • SHA256

    66674b58fcd2f2ba45bc0ce7ede7d78c0f811808ba7c837c882a2b9e487edaff

  • SHA512

    c91903880e4b48f30060a3eccad8db7b53c8751750d4929c0829183c3b35fbe20e8dd0536fae9d141429d37f17067d56387f40ea55e4db3f2c4e3f808c9fa1a3

  • SSDEEP

    6144:8Uvbxx27D7qzfe0gz/+PDQ6sNkJjBbTLbF58CVT2w:p+7n0feL/+Po29BbnbF5d9

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\66674b58fcd2f2ba45bc0ce7ede7d78c0f811808ba7c837c882a2b9e487edaff.exe
    "C:\Users\Admin\AppData\Local\Temp\66674b58fcd2f2ba45bc0ce7ede7d78c0f811808ba7c837c882a2b9e487edaff.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1832
    • C:\Users\Admin\AppData\Local\Temp\66674b58fcd2f2ba45bc0ce7ede7d78c0f811808ba7c837c882a2b9e487edaff.exe
      "C:\Users\Admin\AppData\Local\Temp\66674b58fcd2f2ba45bc0ce7ede7d78c0f811808ba7c837c882a2b9e487edaff.exe"
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3572
      • C:\ProgramData\oDLp9KtP\28jky204Vl7M0NRx.exe
        "C:\ProgramData\oDLp9KtP\28jky204Vl7M0NRx.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2928
        • C:\ProgramData\oDLp9KtP\28jky204Vl7M0NRx.exe
          "C:\ProgramData\oDLp9KtP\28jky204Vl7M0NRx.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:3900
          • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\WCChromeNativeMessagingHost.exe
            "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\WCChromeNativeMessagingHost.exe" /i:3900
            5⤵
              PID:4192

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\oDLp9KtP\28jky204Vl7M0NRx.exe

      Filesize

      375KB

      MD5

      39978c8df1a1189bcb0c55f4fa84d3e4

      SHA1

      025609863d74428ab5e71db28f1bfc788836bfce

      SHA256

      5d4fd426462747c4955cd45d141c3169fd700c97ac32ed37140ac79b9c83191a

      SHA512

      868e1a1fbc12c335dd32983d8e21c2478728f5b921c8c76e4b8969932b4c7cf534877d86475af21d8774432767da9bedcacc9718242f5d96c1ae05c8763bc97e

    • C:\ProgramData\oDLp9KtP\28jky204Vl7M0NRx.exe

      Filesize

      375KB

      MD5

      39978c8df1a1189bcb0c55f4fa84d3e4

      SHA1

      025609863d74428ab5e71db28f1bfc788836bfce

      SHA256

      5d4fd426462747c4955cd45d141c3169fd700c97ac32ed37140ac79b9c83191a

      SHA512

      868e1a1fbc12c335dd32983d8e21c2478728f5b921c8c76e4b8969932b4c7cf534877d86475af21d8774432767da9bedcacc9718242f5d96c1ae05c8763bc97e

    • C:\ProgramData\oDLp9KtP\28jky204Vl7M0NRx.exe

      Filesize

      375KB

      MD5

      39978c8df1a1189bcb0c55f4fa84d3e4

      SHA1

      025609863d74428ab5e71db28f1bfc788836bfce

      SHA256

      5d4fd426462747c4955cd45d141c3169fd700c97ac32ed37140ac79b9c83191a

      SHA512

      868e1a1fbc12c335dd32983d8e21c2478728f5b921c8c76e4b8969932b4c7cf534877d86475af21d8774432767da9bedcacc9718242f5d96c1ae05c8763bc97e

    • C:\ProgramData\oDLp9KtP\28jky204Vl7M0NRx.exe

      Filesize

      375KB

      MD5

      8378b2f4882a9b61e019940785026797

      SHA1

      c2f3f68f5749fd1a82de626e2f07d15ba73ba200

      SHA256

      66674b58fcd2f2ba45bc0ce7ede7d78c0f811808ba7c837c882a2b9e487edaff

      SHA512

      c91903880e4b48f30060a3eccad8db7b53c8751750d4929c0829183c3b35fbe20e8dd0536fae9d141429d37f17067d56387f40ea55e4db3f2c4e3f808c9fa1a3

    • C:\ProgramData\oDLp9KtP\28jky204Vl7M0NRx.exe

      Filesize

      375KB

      MD5

      8378b2f4882a9b61e019940785026797

      SHA1

      c2f3f68f5749fd1a82de626e2f07d15ba73ba200

      SHA256

      66674b58fcd2f2ba45bc0ce7ede7d78c0f811808ba7c837c882a2b9e487edaff

      SHA512

      c91903880e4b48f30060a3eccad8db7b53c8751750d4929c0829183c3b35fbe20e8dd0536fae9d141429d37f17067d56387f40ea55e4db3f2c4e3f808c9fa1a3

    • C:\Users\Admin\AppData\Local\Temp\zTZcxeJzrSV.exe

      Filesize

      375KB

      MD5

      39978c8df1a1189bcb0c55f4fa84d3e4

      SHA1

      025609863d74428ab5e71db28f1bfc788836bfce

      SHA256

      5d4fd426462747c4955cd45d141c3169fd700c97ac32ed37140ac79b9c83191a

      SHA512

      868e1a1fbc12c335dd32983d8e21c2478728f5b921c8c76e4b8969932b4c7cf534877d86475af21d8774432767da9bedcacc9718242f5d96c1ae05c8763bc97e

    • C:\Users\Admin\AppData\Local\Temp\zTZcxeJzrSV.exe

      Filesize

      375KB

      MD5

      39978c8df1a1189bcb0c55f4fa84d3e4

      SHA1

      025609863d74428ab5e71db28f1bfc788836bfce

      SHA256

      5d4fd426462747c4955cd45d141c3169fd700c97ac32ed37140ac79b9c83191a

      SHA512

      868e1a1fbc12c335dd32983d8e21c2478728f5b921c8c76e4b8969932b4c7cf534877d86475af21d8774432767da9bedcacc9718242f5d96c1ae05c8763bc97e

    • memory/3572-133-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/3572-136-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/3572-135-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/3572-142-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/3572-134-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/3572-139-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/3900-151-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/3900-152-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/3900-159-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/4192-158-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/4192-160-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB