Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
362s -
max time network
442s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
02/12/2022, 21:11
Static task
static1
Behavioral task
behavioral1
Sample
ad984c406ec4bf3e8686b7e6d1ab7cab0d0040787093818a1a57b4f223206217.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ad984c406ec4bf3e8686b7e6d1ab7cab0d0040787093818a1a57b4f223206217.exe
Resource
win10v2004-20221111-en
General
-
Target
ad984c406ec4bf3e8686b7e6d1ab7cab0d0040787093818a1a57b4f223206217.exe
-
Size
361KB
-
MD5
1fd13a639ed0388516593d139f1b0000
-
SHA1
3d8636cf47fec01c9954f16d103907c3c1d00239
-
SHA256
ad984c406ec4bf3e8686b7e6d1ab7cab0d0040787093818a1a57b4f223206217
-
SHA512
ee4a27ea02e23ab7e276bc5235cb4f4b2c6731039f51dd0e8f2f89474e6f52ff108dff62c3ae5861508aa8f7c5a2ce99f890c767d79980c22e37133dad2a3d80
-
SSDEEP
6144:zflfAsiL4lIJjiJcbI03GBc3ucY5DCSjX:zflfAsiVGjSGecvX
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1776 mhfzxrpkhczusmke.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2544 ad984c406ec4bf3e8686b7e6d1ab7cab0d0040787093818a1a57b4f223206217.exe 2544 ad984c406ec4bf3e8686b7e6d1ab7cab0d0040787093818a1a57b4f223206217.exe 2544 ad984c406ec4bf3e8686b7e6d1ab7cab0d0040787093818a1a57b4f223206217.exe 2544 ad984c406ec4bf3e8686b7e6d1ab7cab0d0040787093818a1a57b4f223206217.exe 2544 ad984c406ec4bf3e8686b7e6d1ab7cab0d0040787093818a1a57b4f223206217.exe 2544 ad984c406ec4bf3e8686b7e6d1ab7cab0d0040787093818a1a57b4f223206217.exe 2544 ad984c406ec4bf3e8686b7e6d1ab7cab0d0040787093818a1a57b4f223206217.exe 2544 ad984c406ec4bf3e8686b7e6d1ab7cab0d0040787093818a1a57b4f223206217.exe 2544 ad984c406ec4bf3e8686b7e6d1ab7cab0d0040787093818a1a57b4f223206217.exe 2544 ad984c406ec4bf3e8686b7e6d1ab7cab0d0040787093818a1a57b4f223206217.exe 2544 ad984c406ec4bf3e8686b7e6d1ab7cab0d0040787093818a1a57b4f223206217.exe 2544 ad984c406ec4bf3e8686b7e6d1ab7cab0d0040787093818a1a57b4f223206217.exe 2544 ad984c406ec4bf3e8686b7e6d1ab7cab0d0040787093818a1a57b4f223206217.exe 2544 ad984c406ec4bf3e8686b7e6d1ab7cab0d0040787093818a1a57b4f223206217.exe 2544 ad984c406ec4bf3e8686b7e6d1ab7cab0d0040787093818a1a57b4f223206217.exe 2544 ad984c406ec4bf3e8686b7e6d1ab7cab0d0040787093818a1a57b4f223206217.exe 2544 ad984c406ec4bf3e8686b7e6d1ab7cab0d0040787093818a1a57b4f223206217.exe 2544 ad984c406ec4bf3e8686b7e6d1ab7cab0d0040787093818a1a57b4f223206217.exe 2544 ad984c406ec4bf3e8686b7e6d1ab7cab0d0040787093818a1a57b4f223206217.exe 2544 ad984c406ec4bf3e8686b7e6d1ab7cab0d0040787093818a1a57b4f223206217.exe 2544 ad984c406ec4bf3e8686b7e6d1ab7cab0d0040787093818a1a57b4f223206217.exe 2544 ad984c406ec4bf3e8686b7e6d1ab7cab0d0040787093818a1a57b4f223206217.exe 2544 ad984c406ec4bf3e8686b7e6d1ab7cab0d0040787093818a1a57b4f223206217.exe 2544 ad984c406ec4bf3e8686b7e6d1ab7cab0d0040787093818a1a57b4f223206217.exe 2544 ad984c406ec4bf3e8686b7e6d1ab7cab0d0040787093818a1a57b4f223206217.exe 2544 ad984c406ec4bf3e8686b7e6d1ab7cab0d0040787093818a1a57b4f223206217.exe 2544 ad984c406ec4bf3e8686b7e6d1ab7cab0d0040787093818a1a57b4f223206217.exe 2544 ad984c406ec4bf3e8686b7e6d1ab7cab0d0040787093818a1a57b4f223206217.exe 2544 ad984c406ec4bf3e8686b7e6d1ab7cab0d0040787093818a1a57b4f223206217.exe 2544 ad984c406ec4bf3e8686b7e6d1ab7cab0d0040787093818a1a57b4f223206217.exe 2544 ad984c406ec4bf3e8686b7e6d1ab7cab0d0040787093818a1a57b4f223206217.exe 2544 ad984c406ec4bf3e8686b7e6d1ab7cab0d0040787093818a1a57b4f223206217.exe 2544 ad984c406ec4bf3e8686b7e6d1ab7cab0d0040787093818a1a57b4f223206217.exe 2544 ad984c406ec4bf3e8686b7e6d1ab7cab0d0040787093818a1a57b4f223206217.exe 2544 ad984c406ec4bf3e8686b7e6d1ab7cab0d0040787093818a1a57b4f223206217.exe 2544 ad984c406ec4bf3e8686b7e6d1ab7cab0d0040787093818a1a57b4f223206217.exe 2544 ad984c406ec4bf3e8686b7e6d1ab7cab0d0040787093818a1a57b4f223206217.exe 2544 ad984c406ec4bf3e8686b7e6d1ab7cab0d0040787093818a1a57b4f223206217.exe 2544 ad984c406ec4bf3e8686b7e6d1ab7cab0d0040787093818a1a57b4f223206217.exe 2544 ad984c406ec4bf3e8686b7e6d1ab7cab0d0040787093818a1a57b4f223206217.exe 2544 ad984c406ec4bf3e8686b7e6d1ab7cab0d0040787093818a1a57b4f223206217.exe 2544 ad984c406ec4bf3e8686b7e6d1ab7cab0d0040787093818a1a57b4f223206217.exe 2544 ad984c406ec4bf3e8686b7e6d1ab7cab0d0040787093818a1a57b4f223206217.exe 2544 ad984c406ec4bf3e8686b7e6d1ab7cab0d0040787093818a1a57b4f223206217.exe 2544 ad984c406ec4bf3e8686b7e6d1ab7cab0d0040787093818a1a57b4f223206217.exe 2544 ad984c406ec4bf3e8686b7e6d1ab7cab0d0040787093818a1a57b4f223206217.exe 2544 ad984c406ec4bf3e8686b7e6d1ab7cab0d0040787093818a1a57b4f223206217.exe 2544 ad984c406ec4bf3e8686b7e6d1ab7cab0d0040787093818a1a57b4f223206217.exe 2544 ad984c406ec4bf3e8686b7e6d1ab7cab0d0040787093818a1a57b4f223206217.exe 2544 ad984c406ec4bf3e8686b7e6d1ab7cab0d0040787093818a1a57b4f223206217.exe 2544 ad984c406ec4bf3e8686b7e6d1ab7cab0d0040787093818a1a57b4f223206217.exe 2544 ad984c406ec4bf3e8686b7e6d1ab7cab0d0040787093818a1a57b4f223206217.exe 2544 ad984c406ec4bf3e8686b7e6d1ab7cab0d0040787093818a1a57b4f223206217.exe 2544 ad984c406ec4bf3e8686b7e6d1ab7cab0d0040787093818a1a57b4f223206217.exe 2544 ad984c406ec4bf3e8686b7e6d1ab7cab0d0040787093818a1a57b4f223206217.exe 2544 ad984c406ec4bf3e8686b7e6d1ab7cab0d0040787093818a1a57b4f223206217.exe 1776 mhfzxrpkhczusmke.exe 1776 mhfzxrpkhczusmke.exe 1776 mhfzxrpkhczusmke.exe 1776 mhfzxrpkhczusmke.exe 1776 mhfzxrpkhczusmke.exe 1776 mhfzxrpkhczusmke.exe 1776 mhfzxrpkhczusmke.exe 1776 mhfzxrpkhczusmke.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 656 Process not Found -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2544 wrote to memory of 1776 2544 ad984c406ec4bf3e8686b7e6d1ab7cab0d0040787093818a1a57b4f223206217.exe 82 PID 2544 wrote to memory of 1776 2544 ad984c406ec4bf3e8686b7e6d1ab7cab0d0040787093818a1a57b4f223206217.exe 82 PID 2544 wrote to memory of 1776 2544 ad984c406ec4bf3e8686b7e6d1ab7cab0d0040787093818a1a57b4f223206217.exe 82 PID 2544 wrote to memory of 3384 2544 ad984c406ec4bf3e8686b7e6d1ab7cab0d0040787093818a1a57b4f223206217.exe 83 PID 2544 wrote to memory of 3384 2544 ad984c406ec4bf3e8686b7e6d1ab7cab0d0040787093818a1a57b4f223206217.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad984c406ec4bf3e8686b7e6d1ab7cab0d0040787093818a1a57b4f223206217.exe"C:\Users\Admin\AppData\Local\Temp\ad984c406ec4bf3e8686b7e6d1ab7cab0d0040787093818a1a57b4f223206217.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Temp\mhfzxrpkhczusmke.exeC:\Temp\mhfzxrpkhczusmke.exe run2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1776
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://xytets.com:2345/t.asp?os=home2⤵PID:3384
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
361KB
MD54dd1e800c2c1a2f2bb626f421ae37601
SHA139584533a5884c82c6324ffbcb9dd84834b56ee8
SHA256d95de2bad941202ca539c9260345b29b0621204ab06a74eebde6a264dc59c5f1
SHA512949c6016a8d04a08f65af03a3d2d6a075eb64939eccc3b7aabc9e3546d12e9cec37d334fcb51fb50a4706f9a77fedae215af51c70775b762637019a87c126fe2
-
Filesize
361KB
MD54dd1e800c2c1a2f2bb626f421ae37601
SHA139584533a5884c82c6324ffbcb9dd84834b56ee8
SHA256d95de2bad941202ca539c9260345b29b0621204ab06a74eebde6a264dc59c5f1
SHA512949c6016a8d04a08f65af03a3d2d6a075eb64939eccc3b7aabc9e3546d12e9cec37d334fcb51fb50a4706f9a77fedae215af51c70775b762637019a87c126fe2