Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
114s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 08:19
Static task
static1
Behavioral task
behavioral1
Sample
7fffd306cf1ced8cb31d2c792f26d824a44d272cfc53c0781abec0a404cc4035.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7fffd306cf1ced8cb31d2c792f26d824a44d272cfc53c0781abec0a404cc4035.exe
Resource
win10v2004-20220812-en
General
-
Target
7fffd306cf1ced8cb31d2c792f26d824a44d272cfc53c0781abec0a404cc4035.exe
-
Size
132KB
-
MD5
96405e722413fc0e34d9b30bda2d4a6c
-
SHA1
9f0882cf0e5007d2d7d746061df3502210dcad6d
-
SHA256
7fffd306cf1ced8cb31d2c792f26d824a44d272cfc53c0781abec0a404cc4035
-
SHA512
5d1b432848acdcf5f01b6564013ed468978a914e6ccbed065bd0453ee3bce47f51c3f03ddf83af21bbcb2c40a4edd214f834cf4f7d68402f24b146cbbf585397
-
SSDEEP
3072:jmBAi7GlmafuH3K7RpoTPcQjLTjvDHILsX9GUYAbM1O5T9j4VHf1:KiiK/Wb7jvWpU01454f
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4728 ntfyapp.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 1584 netsh.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ntfyapp = "C:\\Windows\\ntfyapp.exe" 7fffd306cf1ced8cb31d2c792f26d824a44d272cfc53c0781abec0a404cc4035.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\ntfyapp.config ntfyapp.exe File created C:\Windows\ntfyapp.exe 7fffd306cf1ced8cb31d2c792f26d824a44d272cfc53c0781abec0a404cc4035.exe File opened for modification C:\Windows\ntfyapp.exe 7fffd306cf1ced8cb31d2c792f26d824a44d272cfc53c0781abec0a404cc4035.exe File created C:\Windows\ntfyapp.config ntfyapp.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 4284 wrote to memory of 5072 4284 7fffd306cf1ced8cb31d2c792f26d824a44d272cfc53c0781abec0a404cc4035.exe 78 PID 4284 wrote to memory of 5072 4284 7fffd306cf1ced8cb31d2c792f26d824a44d272cfc53c0781abec0a404cc4035.exe 78 PID 4284 wrote to memory of 5072 4284 7fffd306cf1ced8cb31d2c792f26d824a44d272cfc53c0781abec0a404cc4035.exe 78 PID 4284 wrote to memory of 5060 4284 7fffd306cf1ced8cb31d2c792f26d824a44d272cfc53c0781abec0a404cc4035.exe 79 PID 4284 wrote to memory of 5060 4284 7fffd306cf1ced8cb31d2c792f26d824a44d272cfc53c0781abec0a404cc4035.exe 79 PID 4284 wrote to memory of 5060 4284 7fffd306cf1ced8cb31d2c792f26d824a44d272cfc53c0781abec0a404cc4035.exe 79 PID 4284 wrote to memory of 4728 4284 7fffd306cf1ced8cb31d2c792f26d824a44d272cfc53c0781abec0a404cc4035.exe 80 PID 4284 wrote to memory of 4728 4284 7fffd306cf1ced8cb31d2c792f26d824a44d272cfc53c0781abec0a404cc4035.exe 80 PID 4284 wrote to memory of 4728 4284 7fffd306cf1ced8cb31d2c792f26d824a44d272cfc53c0781abec0a404cc4035.exe 80 PID 4728 wrote to memory of 1584 4728 ntfyapp.exe 83 PID 4728 wrote to memory of 1584 4728 ntfyapp.exe 83 PID 4728 wrote to memory of 1584 4728 ntfyapp.exe 83 PID 5060 wrote to memory of 4628 5060 w32tm.exe 86 PID 5060 wrote to memory of 4628 5060 w32tm.exe 86 PID 5072 wrote to memory of 3644 5072 w32tm.exe 85 PID 5072 wrote to memory of 3644 5072 w32tm.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\7fffd306cf1ced8cb31d2c792f26d824a44d272cfc53c0781abec0a404cc4035.exe"C:\Users\Admin\AppData\Local\Temp\7fffd306cf1ced8cb31d2c792f26d824a44d272cfc53c0781abec0a404cc4035.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Windows\SysWOW64\w32tm.exew32tm /config /syncfromflags:manual /manualpeerlist:time.windows.com,time.nist.gov2⤵
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Windows\system32\w32tm.exew32tm /config /syncfromflags:manual /manualpeerlist:time.windows.com,time.nist.gov3⤵PID:3644
-
-
-
C:\Windows\SysWOW64\w32tm.exew32tm /config /update2⤵
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Windows\system32\w32tm.exew32tm /config /update3⤵PID:4628
-
-
-
C:\Windows\ntfyapp.exe"C:\Windows\ntfyapp.exe"2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set allowedprogram "C:\Windows\ntfyapp.exe" enable3⤵
- Modifies Windows Firewall
PID:1584
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
132KB
MD596405e722413fc0e34d9b30bda2d4a6c
SHA19f0882cf0e5007d2d7d746061df3502210dcad6d
SHA2567fffd306cf1ced8cb31d2c792f26d824a44d272cfc53c0781abec0a404cc4035
SHA5125d1b432848acdcf5f01b6564013ed468978a914e6ccbed065bd0453ee3bce47f51c3f03ddf83af21bbcb2c40a4edd214f834cf4f7d68402f24b146cbbf585397
-
Filesize
132KB
MD596405e722413fc0e34d9b30bda2d4a6c
SHA19f0882cf0e5007d2d7d746061df3502210dcad6d
SHA2567fffd306cf1ced8cb31d2c792f26d824a44d272cfc53c0781abec0a404cc4035
SHA5125d1b432848acdcf5f01b6564013ed468978a914e6ccbed065bd0453ee3bce47f51c3f03ddf83af21bbcb2c40a4edd214f834cf4f7d68402f24b146cbbf585397