Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
347s -
max time network
419s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
04/12/2022, 05:59
Static task
static1
Behavioral task
behavioral1
Sample
f02a398bdbcaa0339158daf18d7104006fb25090fadf3d56f387a85723f902aa.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f02a398bdbcaa0339158daf18d7104006fb25090fadf3d56f387a85723f902aa.exe
Resource
win10v2004-20221111-en
General
-
Target
f02a398bdbcaa0339158daf18d7104006fb25090fadf3d56f387a85723f902aa.exe
-
Size
144KB
-
MD5
761cd905a105ac82309b786901e0a019
-
SHA1
2db7b0a846968a4c29f61b20167c443819c2c2c8
-
SHA256
f02a398bdbcaa0339158daf18d7104006fb25090fadf3d56f387a85723f902aa
-
SHA512
9a543092e7549867aa489d3abd7cdb504bc56eb9b55dd5b444b81810d7c16e8df077ed3d72463132ffdf0bdec704f48d7ce8af171dbea58b8a05e7b1e051650d
-
SSDEEP
1536:qiUQf1OdalnaYJy8PNigFfaGZp78lbcuZ/+J0g:qiUmOEdvTNVfaGZp78lwuUWg
Malware Config
Signatures
-
Unexpected DNS network traffic destination 4 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 46.28.107.10 Destination IP 46.28.107.10 Destination IP 46.28.107.10 Destination IP 46.28.107.10 -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\xh8pKMYE.com f02a398bdbcaa0339158daf18d7104006fb25090fadf3d56f387a85723f902aa.exe File opened for modification C:\Windows\SysWOW64\xh8pKMYE.com f02a398bdbcaa0339158daf18d7104006fb25090fadf3d56f387a85723f902aa.exe File created C:\Windows\SysWOW64\xh8pKMYE.com.b f02a398bdbcaa0339158daf18d7104006fb25090fadf3d56f387a85723f902aa.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4116 set thread context of 4536 4116 f02a398bdbcaa0339158daf18d7104006fb25090fadf3d56f387a85723f902aa.exe 82 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4536 f02a398bdbcaa0339158daf18d7104006fb25090fadf3d56f387a85723f902aa.exe 4536 f02a398bdbcaa0339158daf18d7104006fb25090fadf3d56f387a85723f902aa.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4116 f02a398bdbcaa0339158daf18d7104006fb25090fadf3d56f387a85723f902aa.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4116 wrote to memory of 4536 4116 f02a398bdbcaa0339158daf18d7104006fb25090fadf3d56f387a85723f902aa.exe 82 PID 4116 wrote to memory of 4536 4116 f02a398bdbcaa0339158daf18d7104006fb25090fadf3d56f387a85723f902aa.exe 82 PID 4116 wrote to memory of 4536 4116 f02a398bdbcaa0339158daf18d7104006fb25090fadf3d56f387a85723f902aa.exe 82 PID 4116 wrote to memory of 4536 4116 f02a398bdbcaa0339158daf18d7104006fb25090fadf3d56f387a85723f902aa.exe 82 PID 4116 wrote to memory of 4536 4116 f02a398bdbcaa0339158daf18d7104006fb25090fadf3d56f387a85723f902aa.exe 82 PID 4116 wrote to memory of 4536 4116 f02a398bdbcaa0339158daf18d7104006fb25090fadf3d56f387a85723f902aa.exe 82 PID 4116 wrote to memory of 4536 4116 f02a398bdbcaa0339158daf18d7104006fb25090fadf3d56f387a85723f902aa.exe 82 PID 4116 wrote to memory of 4536 4116 f02a398bdbcaa0339158daf18d7104006fb25090fadf3d56f387a85723f902aa.exe 82 PID 4116 wrote to memory of 4536 4116 f02a398bdbcaa0339158daf18d7104006fb25090fadf3d56f387a85723f902aa.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\f02a398bdbcaa0339158daf18d7104006fb25090fadf3d56f387a85723f902aa.exe"C:\Users\Admin\AppData\Local\Temp\f02a398bdbcaa0339158daf18d7104006fb25090fadf3d56f387a85723f902aa.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Users\Admin\AppData\Local\Temp\f02a398bdbcaa0339158daf18d7104006fb25090fadf3d56f387a85723f902aa.exe"C:\Users\Admin\AppData\Local\Temp\f02a398bdbcaa0339158daf18d7104006fb25090fadf3d56f387a85723f902aa.exe"2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:4536
-