Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
173s -
max time network
177s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 16:59
Static task
static1
Behavioral task
behavioral1
Sample
d768894f9959c3feb3588e737a8581a76535220cb8d550b0272aba13926a03f4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d768894f9959c3feb3588e737a8581a76535220cb8d550b0272aba13926a03f4.exe
Resource
win10v2004-20220812-en
General
-
Target
d768894f9959c3feb3588e737a8581a76535220cb8d550b0272aba13926a03f4.exe
-
Size
411KB
-
MD5
d60834c15d6f7f934f490ba86cdabe67
-
SHA1
3c2bc5eadbbdaa4bcc2f20df4e7a2c2105dd83b7
-
SHA256
d768894f9959c3feb3588e737a8581a76535220cb8d550b0272aba13926a03f4
-
SHA512
46cdbe31c4fb3a255c2cb292fc13e3a409de481d9f69c19900713f132482c4768136d4f2f0fcf6a6f155802815c19d2add47feeeec51c3051ac32555ced43f90
-
SSDEEP
6144:9GK72n5/Ud/JuoWrJ8/wzGn/N5H3iHNzVNx3dKn:9pe5MV1WrJtC5XszVNx3dKn
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 5036 FCWnAPCpKimmChan.exe 4912 FCWnAPCpKimmChan.exe -
Loads dropped DLL 4 IoCs
pid Process 4084 d768894f9959c3feb3588e737a8581a76535220cb8d550b0272aba13926a03f4.exe 4084 d768894f9959c3feb3588e737a8581a76535220cb8d550b0272aba13926a03f4.exe 4912 FCWnAPCpKimmChan.exe 4912 FCWnAPCpKimmChan.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run d768894f9959c3feb3588e737a8581a76535220cb8d550b0272aba13926a03f4.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\s32LZnAlqbrUQR = "C:\\ProgramData\\WEq2rzzsPFlB10\\FCWnAPCpKimmChan.exe" d768894f9959c3feb3588e737a8581a76535220cb8d550b0272aba13926a03f4.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2720 set thread context of 4084 2720 d768894f9959c3feb3588e737a8581a76535220cb8d550b0272aba13926a03f4.exe 79 PID 5036 set thread context of 4912 5036 FCWnAPCpKimmChan.exe 81 PID 4912 set thread context of 1140 4912 FCWnAPCpKimmChan.exe 82 -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2720 wrote to memory of 4084 2720 d768894f9959c3feb3588e737a8581a76535220cb8d550b0272aba13926a03f4.exe 79 PID 2720 wrote to memory of 4084 2720 d768894f9959c3feb3588e737a8581a76535220cb8d550b0272aba13926a03f4.exe 79 PID 2720 wrote to memory of 4084 2720 d768894f9959c3feb3588e737a8581a76535220cb8d550b0272aba13926a03f4.exe 79 PID 2720 wrote to memory of 4084 2720 d768894f9959c3feb3588e737a8581a76535220cb8d550b0272aba13926a03f4.exe 79 PID 2720 wrote to memory of 4084 2720 d768894f9959c3feb3588e737a8581a76535220cb8d550b0272aba13926a03f4.exe 79 PID 4084 wrote to memory of 5036 4084 d768894f9959c3feb3588e737a8581a76535220cb8d550b0272aba13926a03f4.exe 80 PID 4084 wrote to memory of 5036 4084 d768894f9959c3feb3588e737a8581a76535220cb8d550b0272aba13926a03f4.exe 80 PID 4084 wrote to memory of 5036 4084 d768894f9959c3feb3588e737a8581a76535220cb8d550b0272aba13926a03f4.exe 80 PID 5036 wrote to memory of 4912 5036 FCWnAPCpKimmChan.exe 81 PID 5036 wrote to memory of 4912 5036 FCWnAPCpKimmChan.exe 81 PID 5036 wrote to memory of 4912 5036 FCWnAPCpKimmChan.exe 81 PID 5036 wrote to memory of 4912 5036 FCWnAPCpKimmChan.exe 81 PID 5036 wrote to memory of 4912 5036 FCWnAPCpKimmChan.exe 81 PID 4912 wrote to memory of 1140 4912 FCWnAPCpKimmChan.exe 82 PID 4912 wrote to memory of 1140 4912 FCWnAPCpKimmChan.exe 82 PID 4912 wrote to memory of 1140 4912 FCWnAPCpKimmChan.exe 82 PID 4912 wrote to memory of 1140 4912 FCWnAPCpKimmChan.exe 82 PID 4912 wrote to memory of 1140 4912 FCWnAPCpKimmChan.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\d768894f9959c3feb3588e737a8581a76535220cb8d550b0272aba13926a03f4.exe"C:\Users\Admin\AppData\Local\Temp\d768894f9959c3feb3588e737a8581a76535220cb8d550b0272aba13926a03f4.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\d768894f9959c3feb3588e737a8581a76535220cb8d550b0272aba13926a03f4.exe"C:\Users\Admin\AppData\Local\Temp\d768894f9959c3feb3588e737a8581a76535220cb8d550b0272aba13926a03f4.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\ProgramData\WEq2rzzsPFlB10\FCWnAPCpKimmChan.exe"C:\ProgramData\WEq2rzzsPFlB10\FCWnAPCpKimmChan.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\ProgramData\WEq2rzzsPFlB10\FCWnAPCpKimmChan.exe"C:\ProgramData\WEq2rzzsPFlB10\FCWnAPCpKimmChan.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleUpdateBroker.exe"C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleUpdateBroker.exe" /i:49125⤵PID:1140
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
411KB
MD5d60834c15d6f7f934f490ba86cdabe67
SHA13c2bc5eadbbdaa4bcc2f20df4e7a2c2105dd83b7
SHA256d768894f9959c3feb3588e737a8581a76535220cb8d550b0272aba13926a03f4
SHA51246cdbe31c4fb3a255c2cb292fc13e3a409de481d9f69c19900713f132482c4768136d4f2f0fcf6a6f155802815c19d2add47feeeec51c3051ac32555ced43f90
-
Filesize
411KB
MD5d60834c15d6f7f934f490ba86cdabe67
SHA13c2bc5eadbbdaa4bcc2f20df4e7a2c2105dd83b7
SHA256d768894f9959c3feb3588e737a8581a76535220cb8d550b0272aba13926a03f4
SHA51246cdbe31c4fb3a255c2cb292fc13e3a409de481d9f69c19900713f132482c4768136d4f2f0fcf6a6f155802815c19d2add47feeeec51c3051ac32555ced43f90
-
Filesize
411KB
MD5ed064e0b747c6fd091a2077b614c80b1
SHA14d536a1993110860195d0f7813297108fd5c68e9
SHA256d4e50da43513558dfc58ac22a893361ae54944b050e4a376c99d722ed4347043
SHA512b7177893314f5a264375dc1a5bd0e356b11c3cce659086ceb5497313d182cba51542c126e47b7237c2ea2941cabac1c92281a4da3d0976ae44041d02cb5cb251
-
Filesize
411KB
MD5ed064e0b747c6fd091a2077b614c80b1
SHA14d536a1993110860195d0f7813297108fd5c68e9
SHA256d4e50da43513558dfc58ac22a893361ae54944b050e4a376c99d722ed4347043
SHA512b7177893314f5a264375dc1a5bd0e356b11c3cce659086ceb5497313d182cba51542c126e47b7237c2ea2941cabac1c92281a4da3d0976ae44041d02cb5cb251
-
Filesize
411KB
MD5ed064e0b747c6fd091a2077b614c80b1
SHA14d536a1993110860195d0f7813297108fd5c68e9
SHA256d4e50da43513558dfc58ac22a893361ae54944b050e4a376c99d722ed4347043
SHA512b7177893314f5a264375dc1a5bd0e356b11c3cce659086ceb5497313d182cba51542c126e47b7237c2ea2941cabac1c92281a4da3d0976ae44041d02cb5cb251
-
Filesize
411KB
MD5ed064e0b747c6fd091a2077b614c80b1
SHA14d536a1993110860195d0f7813297108fd5c68e9
SHA256d4e50da43513558dfc58ac22a893361ae54944b050e4a376c99d722ed4347043
SHA512b7177893314f5a264375dc1a5bd0e356b11c3cce659086ceb5497313d182cba51542c126e47b7237c2ea2941cabac1c92281a4da3d0976ae44041d02cb5cb251
-
Filesize
411KB
MD5ed064e0b747c6fd091a2077b614c80b1
SHA14d536a1993110860195d0f7813297108fd5c68e9
SHA256d4e50da43513558dfc58ac22a893361ae54944b050e4a376c99d722ed4347043
SHA512b7177893314f5a264375dc1a5bd0e356b11c3cce659086ceb5497313d182cba51542c126e47b7237c2ea2941cabac1c92281a4da3d0976ae44041d02cb5cb251