Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
183s -
max time network
194s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 20:06
Static task
static1
Behavioral task
behavioral1
Sample
d2f0500e611f0d9cb9fb3abac9be2183b341a3a67b6c60216546a71f22274a05.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d2f0500e611f0d9cb9fb3abac9be2183b341a3a67b6c60216546a71f22274a05.exe
Resource
win10v2004-20221111-en
General
-
Target
d2f0500e611f0d9cb9fb3abac9be2183b341a3a67b6c60216546a71f22274a05.exe
-
Size
1.3MB
-
MD5
d101296ac9a37b696df64c3b8745c4de
-
SHA1
fa6180be5f580c5477b4fab3a562cf403eeb604d
-
SHA256
d2f0500e611f0d9cb9fb3abac9be2183b341a3a67b6c60216546a71f22274a05
-
SHA512
cba1c363f01116d0ece17e243fd9b720e6484fa99f8d71554d1df8f227eaa98ce782e199ca2b3e10dc973b24034910315bf1fd74a329e2995a934cf981ad0bcf
-
SSDEEP
24576:oLI2haCRy3CUv1+oZi5hYRTpcNCV6h9CVVfQjwd0ynj67:oLI0y3bMvKxQjwd0ynj67
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1132 setup080.exe 4032 d2f0500e611f0d9cb9fb3abac9be2183b341a3a67b6c60216546a71f22274a05.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\ntshrui.dll setup080.exe File opened for modification C:\Windows\ntshrui.dll setup080.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1264 d2f0500e611f0d9cb9fb3abac9be2183b341a3a67b6c60216546a71f22274a05.exe 1264 d2f0500e611f0d9cb9fb3abac9be2183b341a3a67b6c60216546a71f22274a05.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1264 wrote to memory of 1132 1264 d2f0500e611f0d9cb9fb3abac9be2183b341a3a67b6c60216546a71f22274a05.exe 83 PID 1264 wrote to memory of 1132 1264 d2f0500e611f0d9cb9fb3abac9be2183b341a3a67b6c60216546a71f22274a05.exe 83 PID 1264 wrote to memory of 1132 1264 d2f0500e611f0d9cb9fb3abac9be2183b341a3a67b6c60216546a71f22274a05.exe 83 PID 1132 wrote to memory of 4752 1132 setup080.exe 84 PID 1132 wrote to memory of 4752 1132 setup080.exe 84 PID 1132 wrote to memory of 4752 1132 setup080.exe 84 PID 1264 wrote to memory of 1652 1264 d2f0500e611f0d9cb9fb3abac9be2183b341a3a67b6c60216546a71f22274a05.exe 86 PID 1264 wrote to memory of 1652 1264 d2f0500e611f0d9cb9fb3abac9be2183b341a3a67b6c60216546a71f22274a05.exe 86 PID 1264 wrote to memory of 1652 1264 d2f0500e611f0d9cb9fb3abac9be2183b341a3a67b6c60216546a71f22274a05.exe 86 PID 1652 wrote to memory of 4032 1652 cmd.exe 88 PID 1652 wrote to memory of 4032 1652 cmd.exe 88 PID 1652 wrote to memory of 4032 1652 cmd.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\d2f0500e611f0d9cb9fb3abac9be2183b341a3a67b6c60216546a71f22274a05.exe"C:\Users\Admin\AppData\Local\Temp\d2f0500e611f0d9cb9fb3abac9be2183b341a3a67b6c60216546a71f22274a05.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Users\Admin\AppData\Local\Temp\setup080.exeC:\Users\Admin\AppData\Local\Temp\\setup080.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ERASE /F C:\Users\Admin\AppData\Local\Temp\setup080.exe3⤵PID:4752
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\\aa.bat2⤵
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\d2f0500e611f0d9cb9fb3abac9be2183b341a3a67b6c60216546a71f22274a05.exe"C:\Users\Admin\AppData\Local\Temp\d2f0500e611f0d9cb9fb3abac9be2183b341a3a67b6c60216546a71f22274a05.exe"3⤵
- Executes dropped EXE
PID:4032
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5b67982870f0de61946a42e0cdf1ccb7b
SHA18881872a7b2328bec6cdbe9e051fc882115dc8d4
SHA256719f11b77cece9693e400ffa8bb60dd4c45deca3e0044d9ac5405652d8492451
SHA512437112579d92fddde0df362278736b7c92fa7685daf489bb3e6c3c8c4e127969f60ecfc18d8ff4db439a4ce6d2a3dfdffe70fabc37df924678745ab59a6968da
-
Filesize
617B
MD5608b136341b1305da56b14576b33b7be
SHA1970af0fd797189d6a2f32f4b8c611c17b717ba06
SHA256a5e6b0b7efb08cb633d99c149d96aca602f10d981d1b1a11b2bdf25c23559ced
SHA512c64300ccda8996e296334a47c6a123c0f99ce8f7a03d1fe240c1706a35f41debe68d0c543aa25f6fd16972654b9a921026af4da72ca0ce3991ab61bc197fd803
-
C:\Users\Admin\AppData\Local\Temp\d2f0500e611f0d9cb9fb3abac9be2183b341a3a67b6c60216546a71f22274a05.exe
Filesize1.3MB
MD5b67982870f0de61946a42e0cdf1ccb7b
SHA18881872a7b2328bec6cdbe9e051fc882115dc8d4
SHA256719f11b77cece9693e400ffa8bb60dd4c45deca3e0044d9ac5405652d8492451
SHA512437112579d92fddde0df362278736b7c92fa7685daf489bb3e6c3c8c4e127969f60ecfc18d8ff4db439a4ce6d2a3dfdffe70fabc37df924678745ab59a6968da
-
Filesize
15KB
MD546da55d3a9e9cd858dc3764e248a523c
SHA16b49fd398deb6694a21a54ad919add66dbbce67a
SHA256ca09704d2a911bce2bc25a4d5881390497727c2f0968c0b0cacd8b40521920fc
SHA5120ea972c4fb969aa6921c47feb24ca48aa6ccde28ea51ebbc1aa954f892ea784a092b2781e2e6348eddb44c47bbd7c6bb889d3f850666b96d3ff6e5c5b27828fe
-
Filesize
15KB
MD546da55d3a9e9cd858dc3764e248a523c
SHA16b49fd398deb6694a21a54ad919add66dbbce67a
SHA256ca09704d2a911bce2bc25a4d5881390497727c2f0968c0b0cacd8b40521920fc
SHA5120ea972c4fb969aa6921c47feb24ca48aa6ccde28ea51ebbc1aa954f892ea784a092b2781e2e6348eddb44c47bbd7c6bb889d3f850666b96d3ff6e5c5b27828fe