Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
200s -
max time network
217s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 08:48
Behavioral task
behavioral1
Sample
b76a1a52ad1776b0e00fad2a61dd6c8c2218792e07e0af1b418eb3f73172ad0b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b76a1a52ad1776b0e00fad2a61dd6c8c2218792e07e0af1b418eb3f73172ad0b.exe
Resource
win10v2004-20221111-en
General
-
Target
b76a1a52ad1776b0e00fad2a61dd6c8c2218792e07e0af1b418eb3f73172ad0b.exe
-
Size
147KB
-
MD5
f12c53bb735ef8b6a89fd03bcf738a6b
-
SHA1
90162122b5aff70843011dff91782b7a29f9b27e
-
SHA256
b76a1a52ad1776b0e00fad2a61dd6c8c2218792e07e0af1b418eb3f73172ad0b
-
SHA512
60e05a423735cc798327369dcc745eb9b0d7eb538c3c88cec141c35c05f9a9b6cade75292cc132e4ad13469d49ce9fc0933b5e47d75be1cde48471a1d23698eb
-
SSDEEP
3072:a4f/MwMHjvsMbnrFnioT6eYu1CIFaB34ul+ezrddTSdFEJ3jWO8bCbOLHD7gbO6X:AZzWoT6RA41J7zrddtsbCbcHD7c1
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3592 msa.exe -
resource yara_rule behavioral2/memory/4900-132-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral2/memory/4900-134-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral2/memory/4900-135-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral2/files/0x0006000000023176-137.dat upx behavioral2/memory/3592-138-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral2/files/0x0006000000023176-139.dat upx behavioral2/memory/3592-141-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral2/memory/3592-142-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral2/memory/4900-143-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral2/memory/3592-144-0x0000000000400000-0x000000000044F000-memory.dmp upx -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\msa.exe b76a1a52ad1776b0e00fad2a61dd6c8c2218792e07e0af1b418eb3f73172ad0b.exe File created C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job msa.exe File opened for modification C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job msa.exe File created C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job b76a1a52ad1776b0e00fad2a61dd6c8c2218792e07e0af1b418eb3f73172ad0b.exe File opened for modification C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job b76a1a52ad1776b0e00fad2a61dd6c8c2218792e07e0af1b418eb3f73172ad0b.exe File created C:\Windows\msa.exe b76a1a52ad1776b0e00fad2a61dd6c8c2218792e07e0af1b418eb3f73172ad0b.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\International msa.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4900 b76a1a52ad1776b0e00fad2a61dd6c8c2218792e07e0af1b418eb3f73172ad0b.exe 4900 b76a1a52ad1776b0e00fad2a61dd6c8c2218792e07e0af1b418eb3f73172ad0b.exe 3592 msa.exe 3592 msa.exe 3592 msa.exe 3592 msa.exe 3592 msa.exe 3592 msa.exe 3592 msa.exe 3592 msa.exe 3592 msa.exe 3592 msa.exe 3592 msa.exe 3592 msa.exe 3592 msa.exe 3592 msa.exe 3592 msa.exe 3592 msa.exe 3592 msa.exe 3592 msa.exe 3592 msa.exe 3592 msa.exe 3592 msa.exe 3592 msa.exe 3592 msa.exe 3592 msa.exe 3592 msa.exe 3592 msa.exe 3592 msa.exe 3592 msa.exe 3592 msa.exe 3592 msa.exe 3592 msa.exe 3592 msa.exe 3592 msa.exe 3592 msa.exe 3592 msa.exe 3592 msa.exe 3592 msa.exe 3592 msa.exe 3592 msa.exe 3592 msa.exe 3592 msa.exe 3592 msa.exe 3592 msa.exe 3592 msa.exe 3592 msa.exe 3592 msa.exe 3592 msa.exe 3592 msa.exe 3592 msa.exe 3592 msa.exe 3592 msa.exe 3592 msa.exe 3592 msa.exe 3592 msa.exe 3592 msa.exe 3592 msa.exe 3592 msa.exe 3592 msa.exe 3592 msa.exe 3592 msa.exe 3592 msa.exe 3592 msa.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3592 msa.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4900 wrote to memory of 3592 4900 b76a1a52ad1776b0e00fad2a61dd6c8c2218792e07e0af1b418eb3f73172ad0b.exe 80 PID 4900 wrote to memory of 3592 4900 b76a1a52ad1776b0e00fad2a61dd6c8c2218792e07e0af1b418eb3f73172ad0b.exe 80 PID 4900 wrote to memory of 3592 4900 b76a1a52ad1776b0e00fad2a61dd6c8c2218792e07e0af1b418eb3f73172ad0b.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\b76a1a52ad1776b0e00fad2a61dd6c8c2218792e07e0af1b418eb3f73172ad0b.exe"C:\Users\Admin\AppData\Local\Temp\b76a1a52ad1776b0e00fad2a61dd6c8c2218792e07e0af1b418eb3f73172ad0b.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Windows\msa.exeC:\Windows\msa.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:3592
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
426B
MD5e0aafac7ebd274e8c7d45ea0b41ce959
SHA1bfea7f02a6fc93633db36ac9de5370f1cba1b67a
SHA2568be9c39af1b9e02b06cc367018cd7d1fc620e468e441e94c5cfc4f7bc2b9ff2f
SHA512d7a913a540a12346de18291219c7f956a1cf229612d6ad56fe4e814645b11e49289b6027f7109e9f0b570c8768e5324d34d07cac24d47ac098f95313ba59e189
-
Filesize
147KB
MD5f12c53bb735ef8b6a89fd03bcf738a6b
SHA190162122b5aff70843011dff91782b7a29f9b27e
SHA256b76a1a52ad1776b0e00fad2a61dd6c8c2218792e07e0af1b418eb3f73172ad0b
SHA51260e05a423735cc798327369dcc745eb9b0d7eb538c3c88cec141c35c05f9a9b6cade75292cc132e4ad13469d49ce9fc0933b5e47d75be1cde48471a1d23698eb
-
Filesize
147KB
MD5f12c53bb735ef8b6a89fd03bcf738a6b
SHA190162122b5aff70843011dff91782b7a29f9b27e
SHA256b76a1a52ad1776b0e00fad2a61dd6c8c2218792e07e0af1b418eb3f73172ad0b
SHA51260e05a423735cc798327369dcc745eb9b0d7eb538c3c88cec141c35c05f9a9b6cade75292cc132e4ad13469d49ce9fc0933b5e47d75be1cde48471a1d23698eb