Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
61s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 12:59
Static task
static1
Behavioral task
behavioral1
Sample
cc3c9ef4c5c2c0e4091520ca53c133652cff3013408017f2c2d66a87e43f4d99.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cc3c9ef4c5c2c0e4091520ca53c133652cff3013408017f2c2d66a87e43f4d99.exe
Resource
win10v2004-20220901-en
General
-
Target
cc3c9ef4c5c2c0e4091520ca53c133652cff3013408017f2c2d66a87e43f4d99.exe
-
Size
501KB
-
MD5
70ba395b631e31f278ab7baf879e6218
-
SHA1
437d00c3e5cb573c416fdee88bb058c177f80736
-
SHA256
cc3c9ef4c5c2c0e4091520ca53c133652cff3013408017f2c2d66a87e43f4d99
-
SHA512
e60d6cce55daf9ad1760ac5322669e17f93f13c6c6adc0b25c77e4f4aaa0d5a63368e3b9d004cfbbe0687396e2367b2f75993aea9841fcd4a31d664be2ff2c12
-
SSDEEP
6144:pdNszUtPwxMqhqTpMjSFDWG1rOaCNDGLQvoEnv3U2Y72mxK4advrzHpKBD:p6VmdMGV2lHY72MK7dXkBD
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3772 kYxQJPXft.exe 4516 kYxQJPXft.exe -
Loads dropped DLL 4 IoCs
pid Process 3876 cc3c9ef4c5c2c0e4091520ca53c133652cff3013408017f2c2d66a87e43f4d99.exe 3876 cc3c9ef4c5c2c0e4091520ca53c133652cff3013408017f2c2d66a87e43f4d99.exe 4516 kYxQJPXft.exe 4516 kYxQJPXft.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run cc3c9ef4c5c2c0e4091520ca53c133652cff3013408017f2c2d66a87e43f4d99.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Asva29yz = "C:\\ProgramData\\F1NPlIdTMkW9m\\kYxQJPXft.exe" cc3c9ef4c5c2c0e4091520ca53c133652cff3013408017f2c2d66a87e43f4d99.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 400 set thread context of 3876 400 cc3c9ef4c5c2c0e4091520ca53c133652cff3013408017f2c2d66a87e43f4d99.exe 83 PID 3772 set thread context of 4516 3772 kYxQJPXft.exe 87 PID 4516 set thread context of 3500 4516 kYxQJPXft.exe 95 -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 400 wrote to memory of 3876 400 cc3c9ef4c5c2c0e4091520ca53c133652cff3013408017f2c2d66a87e43f4d99.exe 83 PID 400 wrote to memory of 3876 400 cc3c9ef4c5c2c0e4091520ca53c133652cff3013408017f2c2d66a87e43f4d99.exe 83 PID 400 wrote to memory of 3876 400 cc3c9ef4c5c2c0e4091520ca53c133652cff3013408017f2c2d66a87e43f4d99.exe 83 PID 400 wrote to memory of 3876 400 cc3c9ef4c5c2c0e4091520ca53c133652cff3013408017f2c2d66a87e43f4d99.exe 83 PID 400 wrote to memory of 3876 400 cc3c9ef4c5c2c0e4091520ca53c133652cff3013408017f2c2d66a87e43f4d99.exe 83 PID 3876 wrote to memory of 3772 3876 cc3c9ef4c5c2c0e4091520ca53c133652cff3013408017f2c2d66a87e43f4d99.exe 84 PID 3876 wrote to memory of 3772 3876 cc3c9ef4c5c2c0e4091520ca53c133652cff3013408017f2c2d66a87e43f4d99.exe 84 PID 3876 wrote to memory of 3772 3876 cc3c9ef4c5c2c0e4091520ca53c133652cff3013408017f2c2d66a87e43f4d99.exe 84 PID 3772 wrote to memory of 4516 3772 kYxQJPXft.exe 87 PID 3772 wrote to memory of 4516 3772 kYxQJPXft.exe 87 PID 3772 wrote to memory of 4516 3772 kYxQJPXft.exe 87 PID 3772 wrote to memory of 4516 3772 kYxQJPXft.exe 87 PID 3772 wrote to memory of 4516 3772 kYxQJPXft.exe 87 PID 4516 wrote to memory of 900 4516 kYxQJPXft.exe 90 PID 4516 wrote to memory of 900 4516 kYxQJPXft.exe 90 PID 4516 wrote to memory of 900 4516 kYxQJPXft.exe 90 PID 4516 wrote to memory of 3500 4516 kYxQJPXft.exe 95 PID 4516 wrote to memory of 3500 4516 kYxQJPXft.exe 95 PID 4516 wrote to memory of 3500 4516 kYxQJPXft.exe 95 PID 4516 wrote to memory of 3500 4516 kYxQJPXft.exe 95 PID 4516 wrote to memory of 3500 4516 kYxQJPXft.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc3c9ef4c5c2c0e4091520ca53c133652cff3013408017f2c2d66a87e43f4d99.exe"C:\Users\Admin\AppData\Local\Temp\cc3c9ef4c5c2c0e4091520ca53c133652cff3013408017f2c2d66a87e43f4d99.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Users\Admin\AppData\Local\Temp\cc3c9ef4c5c2c0e4091520ca53c133652cff3013408017f2c2d66a87e43f4d99.exe"C:\Users\Admin\AppData\Local\Temp\cc3c9ef4c5c2c0e4091520ca53c133652cff3013408017f2c2d66a87e43f4d99.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3876 -
C:\ProgramData\F1NPlIdTMkW9m\kYxQJPXft.exe"C:\ProgramData\F1NPlIdTMkW9m\kYxQJPXft.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\ProgramData\F1NPlIdTMkW9m\kYxQJPXft.exe"C:\ProgramData\F1NPlIdTMkW9m\kYxQJPXft.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AdobeCollabSync.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AdobeCollabSync.exe" /i:45165⤵PID:900
-
-
C:\Program Files (x86)\Windows Media Player\wmlaunch.exe"C:\Program Files (x86)\Windows Media Player\wmlaunch.exe" /i:45165⤵PID:3500
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
501KB
MD5a33728aee3759b81872505fba651efbe
SHA1235216ea46b5a9b1a7f8f367b1c2ec544fdff847
SHA256a014f7c64fbdaed415eda326caa76ca81dde8c393240b09af5f763da7b9ff1a5
SHA51299f6f4ed0f3803822758dbd79008590a3cc1e00a1e7ee01fe8573c91981809c41a6f0b83b01186af2384b651168da68746ee5005c21ffcc6fa866ca6204265a2
-
Filesize
501KB
MD5a33728aee3759b81872505fba651efbe
SHA1235216ea46b5a9b1a7f8f367b1c2ec544fdff847
SHA256a014f7c64fbdaed415eda326caa76ca81dde8c393240b09af5f763da7b9ff1a5
SHA51299f6f4ed0f3803822758dbd79008590a3cc1e00a1e7ee01fe8573c91981809c41a6f0b83b01186af2384b651168da68746ee5005c21ffcc6fa866ca6204265a2
-
Filesize
501KB
MD5a33728aee3759b81872505fba651efbe
SHA1235216ea46b5a9b1a7f8f367b1c2ec544fdff847
SHA256a014f7c64fbdaed415eda326caa76ca81dde8c393240b09af5f763da7b9ff1a5
SHA51299f6f4ed0f3803822758dbd79008590a3cc1e00a1e7ee01fe8573c91981809c41a6f0b83b01186af2384b651168da68746ee5005c21ffcc6fa866ca6204265a2
-
Filesize
501KB
MD570ba395b631e31f278ab7baf879e6218
SHA1437d00c3e5cb573c416fdee88bb058c177f80736
SHA256cc3c9ef4c5c2c0e4091520ca53c133652cff3013408017f2c2d66a87e43f4d99
SHA512e60d6cce55daf9ad1760ac5322669e17f93f13c6c6adc0b25c77e4f4aaa0d5a63368e3b9d004cfbbe0687396e2367b2f75993aea9841fcd4a31d664be2ff2c12
-
Filesize
501KB
MD570ba395b631e31f278ab7baf879e6218
SHA1437d00c3e5cb573c416fdee88bb058c177f80736
SHA256cc3c9ef4c5c2c0e4091520ca53c133652cff3013408017f2c2d66a87e43f4d99
SHA512e60d6cce55daf9ad1760ac5322669e17f93f13c6c6adc0b25c77e4f4aaa0d5a63368e3b9d004cfbbe0687396e2367b2f75993aea9841fcd4a31d664be2ff2c12
-
Filesize
501KB
MD5a33728aee3759b81872505fba651efbe
SHA1235216ea46b5a9b1a7f8f367b1c2ec544fdff847
SHA256a014f7c64fbdaed415eda326caa76ca81dde8c393240b09af5f763da7b9ff1a5
SHA51299f6f4ed0f3803822758dbd79008590a3cc1e00a1e7ee01fe8573c91981809c41a6f0b83b01186af2384b651168da68746ee5005c21ffcc6fa866ca6204265a2
-
Filesize
501KB
MD5a33728aee3759b81872505fba651efbe
SHA1235216ea46b5a9b1a7f8f367b1c2ec544fdff847
SHA256a014f7c64fbdaed415eda326caa76ca81dde8c393240b09af5f763da7b9ff1a5
SHA51299f6f4ed0f3803822758dbd79008590a3cc1e00a1e7ee01fe8573c91981809c41a6f0b83b01186af2384b651168da68746ee5005c21ffcc6fa866ca6204265a2