Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
156s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 14:09
Static task
static1
Behavioral task
behavioral1
Sample
bda6c1ed66ad82ca4f51eb589abd5ee768c81e51cac6af4bc606b92d8ddac0ce.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
bda6c1ed66ad82ca4f51eb589abd5ee768c81e51cac6af4bc606b92d8ddac0ce.exe
Resource
win10v2004-20220812-en
General
-
Target
bda6c1ed66ad82ca4f51eb589abd5ee768c81e51cac6af4bc606b92d8ddac0ce.exe
-
Size
118KB
-
MD5
60e0bb0651734e438a73d5fd130dae13
-
SHA1
3fd37138aeb73d4590f018fade81ce108f550269
-
SHA256
bda6c1ed66ad82ca4f51eb589abd5ee768c81e51cac6af4bc606b92d8ddac0ce
-
SHA512
5958b23206568a510ad3e2b01f6446e8ba208d179280206f83f0c4f2635287f7d8753e627a6df141c8f57f68b514ecb6739a06058229ff7d89e93ad0a6ec138d
-
SSDEEP
3072:hsNCMCN4me7rNzAuxq5XelL044RI4bX1C1uKJrF+SjGeRoc:hscBNqrNUuw5uh04LKi/5F+CGeRo
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 3964 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mapap = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Roaming\\mapap.dll\",FreeTempFileList" bda6c1ed66ad82ca4f51eb589abd5ee768c81e51cac6af4bc606b92d8ddac0ce.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{D2D5C359-4CBA-4017-9D27-B1AB5A282D3F}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{83F109CD-CAB2-4607-ADB3-4BA450548BC8}.catalogItem svchost.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU svchost.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1152 wrote to memory of 3964 1152 bda6c1ed66ad82ca4f51eb589abd5ee768c81e51cac6af4bc606b92d8ddac0ce.exe 75 PID 1152 wrote to memory of 3964 1152 bda6c1ed66ad82ca4f51eb589abd5ee768c81e51cac6af4bc606b92d8ddac0ce.exe 75 PID 1152 wrote to memory of 3964 1152 bda6c1ed66ad82ca4f51eb589abd5ee768c81e51cac6af4bc606b92d8ddac0ce.exe 75
Processes
-
C:\Users\Admin\AppData\Local\Temp\bda6c1ed66ad82ca4f51eb589abd5ee768c81e51cac6af4bc606b92d8ddac0ce.exe"C:\Users\Admin\AppData\Local\Temp\bda6c1ed66ad82ca4f51eb589abd5ee768c81e51cac6af4bc606b92d8ddac0ce.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Roaming\mapap.dll",GetCounter2⤵
- Loads dropped DLL
PID:3964
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵
- Drops file in System32 directory
- Checks processor information in registry
- Enumerates system info in registry
PID:2476
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
118KB
MD56315fe399f8f99bd5a76a17069efc4a6
SHA1e957d2c5e35e3d229ebd7345d4902c9c38f94313
SHA25693c2cd9f62bb4fd9deeb9e85c289521bab9c9e8e27698d26584ea5e170d12e0c
SHA5129bef788bb4b2dbba0a0cbfd9a324b544d62f21660b55d42ad5e7a7720bd8b1e0bcc2f37f7ea797f8bb388629edb62b12c189b8b13ee9c674c0123390125d58e1
-
Filesize
118KB
MD56315fe399f8f99bd5a76a17069efc4a6
SHA1e957d2c5e35e3d229ebd7345d4902c9c38f94313
SHA25693c2cd9f62bb4fd9deeb9e85c289521bab9c9e8e27698d26584ea5e170d12e0c
SHA5129bef788bb4b2dbba0a0cbfd9a324b544d62f21660b55d42ad5e7a7720bd8b1e0bcc2f37f7ea797f8bb388629edb62b12c189b8b13ee9c674c0123390125d58e1