Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    419s
  • max time network
    538s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/12/2022, 00:08

General

  • Target

    f0e5b9c6a534f8752fa8912a5e53633f2ad8f3d94ff6dc5db1ad3b8044cff8bf.exe

  • Size

    46KB

  • MD5

    86e9b319b35595196d4410e818c6f083

  • SHA1

    32dc7654b04605317772ec62c4d9451aefcbd81c

  • SHA256

    f0e5b9c6a534f8752fa8912a5e53633f2ad8f3d94ff6dc5db1ad3b8044cff8bf

  • SHA512

    89c90db94c600c79f4ff66f6386629891b309fe9311d713f90f240af74f8951574769bae2e8bce96ea0dcda8c597237f28ce6f12574401fbdccafa482822c6cf

  • SSDEEP

    768:j4s7OA+LgejptQwAdIKioQNmch3wynFYNrCgSSEARs091pVv6:jLOPpA9iF1AL+gSSEARs0Hv6

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:2540
      • C:\Users\Admin\AppData\Local\Temp\f0e5b9c6a534f8752fa8912a5e53633f2ad8f3d94ff6dc5db1ad3b8044cff8bf.exe
        "C:\Users\Admin\AppData\Local\Temp\f0e5b9c6a534f8752fa8912a5e53633f2ad8f3d94ff6dc5db1ad3b8044cff8bf.exe"
        2⤵
        • Drops file in Drivers directory
        • Sets service image path in registry
        • Loads dropped DLL
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: LoadsDriver
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1784
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\f0e5b9c6a534f8752fa8912a5e53633f2ad8f3d94ff6dc5db1ad3b8044cff8bf.exe
          3⤵
            PID:1688

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\f0e5b9c6a534f8752fa8912a5e53633f2ad8f3d94ff6dc5db1ad3b8044cff8bf.dat

        Filesize

        41KB

        MD5

        9c1cab88d46c8b42fb3d6aa41ee2f19c

        SHA1

        c8bff88e564003c27e19f82511be212c0bad7c1a

        SHA256

        d104f46ed8d195308345ef236ec04715cd5be2a1ce55bf5b859f87429f77c23e

        SHA512

        ee5abc904b4064172034072c33d93edc8abfd220741ecfeb1c067b074bec5ce6651a98f77b7a7192e2866e80f995978dbe26a949344e30b2568a04eea4521a97

      • C:\Users\Admin\AppData\Local\Temp\f0e5b9c6a534f8752fa8912a5e53633f2ad8f3d94ff6dc5db1ad3b8044cff8bf.dat

        Filesize

        41KB

        MD5

        9c1cab88d46c8b42fb3d6aa41ee2f19c

        SHA1

        c8bff88e564003c27e19f82511be212c0bad7c1a

        SHA256

        d104f46ed8d195308345ef236ec04715cd5be2a1ce55bf5b859f87429f77c23e

        SHA512

        ee5abc904b4064172034072c33d93edc8abfd220741ecfeb1c067b074bec5ce6651a98f77b7a7192e2866e80f995978dbe26a949344e30b2568a04eea4521a97

      • memory/1784-134-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/1784-135-0x00000000004A0000-0x00000000004BC000-memory.dmp

        Filesize

        112KB