Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
302s -
max time network
332s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 06:42
Static task
static1
Behavioral task
behavioral1
Sample
b1f8d1b28ed2883242259d05ae2c2c6cd374463b86970b5c0ed2eff28f9ee8fa.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b1f8d1b28ed2883242259d05ae2c2c6cd374463b86970b5c0ed2eff28f9ee8fa.exe
Resource
win10v2004-20221111-en
General
-
Target
b1f8d1b28ed2883242259d05ae2c2c6cd374463b86970b5c0ed2eff28f9ee8fa.exe
-
Size
680KB
-
MD5
4acbbebb73812d967c4009d4c834d870
-
SHA1
28593a7f6fbb7a8fce62062657fa7660a4c43af0
-
SHA256
b1f8d1b28ed2883242259d05ae2c2c6cd374463b86970b5c0ed2eff28f9ee8fa
-
SHA512
b88f7be6b3263d28f992735ec81ae8930af389d34760e6cfa262248a102509e92ae5159eda6065adc2fbac2e93b890bcafc819b4e13090e96e10b87b9e0b4fa5
-
SSDEEP
3072:u3PHZgTYIvcSGAw44pI8dhFM35CyR26P7yo2Ntj/KPTe7K2oj+WZN1+VmM3oeRju:0/TOm/tmQjMZqqULirTmQjMoAjyUz8t
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 528 b1f8d1b28ed2883242259d05ae2c2c6cd374463b86970b5c0ed2eff28f9ee8fa.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\wmimgr32.dl_ b1f8d1b28ed2883242259d05ae2c2c6cd374463b86970b5c0ed2eff28f9ee8fa.exe File created C:\Windows\SysWOW64\wmimgr32.dll b1f8d1b28ed2883242259d05ae2c2c6cd374463b86970b5c0ed2eff28f9ee8fa.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2484 set thread context of 528 2484 b1f8d1b28ed2883242259d05ae2c2c6cd374463b86970b5c0ed2eff28f9ee8fa.exe 82 -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SYSTEM.INI b1f8d1b28ed2883242259d05ae2c2c6cd374463b86970b5c0ed2eff28f9ee8fa.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 528 b1f8d1b28ed2883242259d05ae2c2c6cd374463b86970b5c0ed2eff28f9ee8fa.exe 528 b1f8d1b28ed2883242259d05ae2c2c6cd374463b86970b5c0ed2eff28f9ee8fa.exe 528 b1f8d1b28ed2883242259d05ae2c2c6cd374463b86970b5c0ed2eff28f9ee8fa.exe 528 b1f8d1b28ed2883242259d05ae2c2c6cd374463b86970b5c0ed2eff28f9ee8fa.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2484 b1f8d1b28ed2883242259d05ae2c2c6cd374463b86970b5c0ed2eff28f9ee8fa.exe 528 b1f8d1b28ed2883242259d05ae2c2c6cd374463b86970b5c0ed2eff28f9ee8fa.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2484 wrote to memory of 528 2484 b1f8d1b28ed2883242259d05ae2c2c6cd374463b86970b5c0ed2eff28f9ee8fa.exe 82 PID 2484 wrote to memory of 528 2484 b1f8d1b28ed2883242259d05ae2c2c6cd374463b86970b5c0ed2eff28f9ee8fa.exe 82 PID 2484 wrote to memory of 528 2484 b1f8d1b28ed2883242259d05ae2c2c6cd374463b86970b5c0ed2eff28f9ee8fa.exe 82 PID 2484 wrote to memory of 528 2484 b1f8d1b28ed2883242259d05ae2c2c6cd374463b86970b5c0ed2eff28f9ee8fa.exe 82 PID 2484 wrote to memory of 528 2484 b1f8d1b28ed2883242259d05ae2c2c6cd374463b86970b5c0ed2eff28f9ee8fa.exe 82 PID 2484 wrote to memory of 528 2484 b1f8d1b28ed2883242259d05ae2c2c6cd374463b86970b5c0ed2eff28f9ee8fa.exe 82 PID 2484 wrote to memory of 528 2484 b1f8d1b28ed2883242259d05ae2c2c6cd374463b86970b5c0ed2eff28f9ee8fa.exe 82 PID 2484 wrote to memory of 528 2484 b1f8d1b28ed2883242259d05ae2c2c6cd374463b86970b5c0ed2eff28f9ee8fa.exe 82 PID 528 wrote to memory of 2688 528 b1f8d1b28ed2883242259d05ae2c2c6cd374463b86970b5c0ed2eff28f9ee8fa.exe 54 PID 528 wrote to memory of 2688 528 b1f8d1b28ed2883242259d05ae2c2c6cd374463b86970b5c0ed2eff28f9ee8fa.exe 54 PID 528 wrote to memory of 2688 528 b1f8d1b28ed2883242259d05ae2c2c6cd374463b86970b5c0ed2eff28f9ee8fa.exe 54 PID 528 wrote to memory of 2688 528 b1f8d1b28ed2883242259d05ae2c2c6cd374463b86970b5c0ed2eff28f9ee8fa.exe 54
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:2688
-
C:\Users\Admin\AppData\Local\Temp\b1f8d1b28ed2883242259d05ae2c2c6cd374463b86970b5c0ed2eff28f9ee8fa.exe"C:\Users\Admin\AppData\Local\Temp\b1f8d1b28ed2883242259d05ae2c2c6cd374463b86970b5c0ed2eff28f9ee8fa.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\b1f8d1b28ed2883242259d05ae2c2c6cd374463b86970b5c0ed2eff28f9ee8fa.exe"C:\Users\Admin\AppData\Local\Temp\b1f8d1b28ed2883242259d05ae2c2c6cd374463b86970b5c0ed2eff28f9ee8fa.exe"3⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:528
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD59ebb3e4fc0c32524ba4098e214a06150
SHA141d0964a70edc0875ff9a8091b6911e18684e1ed
SHA256f183002d0c6412dc694b580e0b33194766921415e77f713d46cb29dac6ae196d
SHA512d7338292e03fd374fec772787e7561a6d6e9ca0b108cf4b6e9f79647bf0f64960ec78979e986f8bfa9874d907ecacca81183faacdd350e890c0dab02ca50298a