Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    214s
  • max time network
    236s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/12/2022, 13:18

General

  • Target

    a89aa325dd9cab012b6507d0b5d3ef4d5a037d6db170350df93c5f704dfab95f.exe

  • Size

    53KB

  • MD5

    8400820fbbc384feaec5e28558139052

  • SHA1

    806a60eca38e7932acd2d9995a29512f0f2ce5e3

  • SHA256

    a89aa325dd9cab012b6507d0b5d3ef4d5a037d6db170350df93c5f704dfab95f

  • SHA512

    da0d598607a8f30b45075936afcb527afc76cc089a21c9ee1a82022ab0d9f91990017ce45f4f19a9301350972b8d54205e55dea7fe23876e92b90beb76a80bd3

  • SSDEEP

    768:745U2Bvzx4n8l6LqAAMAZnjFy91QxEpXts3l11ecrAG726jdpI9GHDe28X9:745BuHAzZyTFVqIAAuL7DW9

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies firewall policy service 2 TTPs 4 IoCs
  • Executes dropped EXE 2 IoCs
  • Modifies WinLogon 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a89aa325dd9cab012b6507d0b5d3ef4d5a037d6db170350df93c5f704dfab95f.exe
    "C:\Users\Admin\AppData\Local\Temp\a89aa325dd9cab012b6507d0b5d3ef4d5a037d6db170350df93c5f704dfab95f.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:5028
    • C:\Users\Admin\AppData\Local\Temp\a89aa325dd9cab012b6507d0b5d3ef4d5a037d6db170350df93c5f704dfab95f.exe
      "C:\Users\Admin\AppData\Local\Temp\a89aa325dd9cab012b6507d0b5d3ef4d5a037d6db170350df93c5f704dfab95f.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies firewall policy service
      • Modifies WinLogon
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:2192
      • C:\Windows\msnmgr.exe
        "C:\Windows\msnmgr.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1508
        • C:\Windows\msnmgr.exe
          "C:\Windows\msnmgr.exe"
          4⤵
          • Executes dropped EXE
          PID:64

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\msnmgr.exe

    Filesize

    53KB

    MD5

    8400820fbbc384feaec5e28558139052

    SHA1

    806a60eca38e7932acd2d9995a29512f0f2ce5e3

    SHA256

    a89aa325dd9cab012b6507d0b5d3ef4d5a037d6db170350df93c5f704dfab95f

    SHA512

    da0d598607a8f30b45075936afcb527afc76cc089a21c9ee1a82022ab0d9f91990017ce45f4f19a9301350972b8d54205e55dea7fe23876e92b90beb76a80bd3

  • C:\Windows\msnmgr.exe

    Filesize

    53KB

    MD5

    8400820fbbc384feaec5e28558139052

    SHA1

    806a60eca38e7932acd2d9995a29512f0f2ce5e3

    SHA256

    a89aa325dd9cab012b6507d0b5d3ef4d5a037d6db170350df93c5f704dfab95f

    SHA512

    da0d598607a8f30b45075936afcb527afc76cc089a21c9ee1a82022ab0d9f91990017ce45f4f19a9301350972b8d54205e55dea7fe23876e92b90beb76a80bd3

  • C:\Windows\msnmgr.exe

    Filesize

    53KB

    MD5

    8400820fbbc384feaec5e28558139052

    SHA1

    806a60eca38e7932acd2d9995a29512f0f2ce5e3

    SHA256

    a89aa325dd9cab012b6507d0b5d3ef4d5a037d6db170350df93c5f704dfab95f

    SHA512

    da0d598607a8f30b45075936afcb527afc76cc089a21c9ee1a82022ab0d9f91990017ce45f4f19a9301350972b8d54205e55dea7fe23876e92b90beb76a80bd3

  • memory/2192-133-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/2192-134-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/2192-135-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/2192-137-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB