Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
224s -
max time network
248s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 19:16
Static task
static1
Behavioral task
behavioral1
Sample
91609cc26eb99f12c511a60144456c148cf2e5219882c36dcf403ec9cfa23d62.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
91609cc26eb99f12c511a60144456c148cf2e5219882c36dcf403ec9cfa23d62.exe
Resource
win10v2004-20221111-en
General
-
Target
91609cc26eb99f12c511a60144456c148cf2e5219882c36dcf403ec9cfa23d62.exe
-
Size
248KB
-
MD5
c2cfedb51cdb805c600985af29e13918
-
SHA1
89f4eadb77ece4b1da90faa12da466af1e5f3276
-
SHA256
91609cc26eb99f12c511a60144456c148cf2e5219882c36dcf403ec9cfa23d62
-
SHA512
31df38fe3323fcb526a851c945c31a56fba54aff2b74581c713007185114078f6324f7eb011e5a8c59ffd052cbaf94b4dec0a1752aaabb26a34dddfe1b01c4fe
-
SSDEEP
6144:wv8OCXmikdlT6vg1ozZhd08bLjHWkg64Htf7YRU0OwFf3Uot5:CmXSdlGqozZkmHWkgDsFOwRH5
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2188 1.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 91609cc26eb99f12c511a60144456c148cf2e5219882c36dcf403ec9cfa23d62.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 91609cc26eb99f12c511a60144456c148cf2e5219882c36dcf403ec9cfa23d62.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2188 1.exe 2188 1.exe 2188 1.exe 2188 1.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3532 wrote to memory of 2188 3532 91609cc26eb99f12c511a60144456c148cf2e5219882c36dcf403ec9cfa23d62.exe 80 PID 3532 wrote to memory of 2188 3532 91609cc26eb99f12c511a60144456c148cf2e5219882c36dcf403ec9cfa23d62.exe 80 PID 3532 wrote to memory of 2188 3532 91609cc26eb99f12c511a60144456c148cf2e5219882c36dcf403ec9cfa23d62.exe 80 PID 2188 wrote to memory of 2640 2188 1.exe 53 PID 2188 wrote to memory of 2640 2188 1.exe 53 PID 2188 wrote to memory of 2640 2188 1.exe 53 PID 2188 wrote to memory of 2640 2188 1.exe 53
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:2640
-
C:\Users\Admin\AppData\Local\Temp\91609cc26eb99f12c511a60144456c148cf2e5219882c36dcf403ec9cfa23d62.exe"C:\Users\Admin\AppData\Local\Temp\91609cc26eb99f12c511a60144456c148cf2e5219882c36dcf403ec9cfa23d62.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2188
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD5ecd3f3b4e259d27b7161ac1c38fd592d
SHA1b10155fcf11ec48717ef3ed94d66e77efe418b37
SHA25644f39488ed0fdf8e6b5747a471bea6716045adfea2bb327af8d8bbd55d8c8319
SHA5124c4c743d5eb5c80af895f150a696ee7840380bacf52c28545b4196608b2b0d6b6828fbba3e0fa1b163caf4bb1c0eecc645545cf90891401f952929ca569ded08
-
Filesize
31KB
MD5ecd3f3b4e259d27b7161ac1c38fd592d
SHA1b10155fcf11ec48717ef3ed94d66e77efe418b37
SHA25644f39488ed0fdf8e6b5747a471bea6716045adfea2bb327af8d8bbd55d8c8319
SHA5124c4c743d5eb5c80af895f150a696ee7840380bacf52c28545b4196608b2b0d6b6828fbba3e0fa1b163caf4bb1c0eecc645545cf90891401f952929ca569ded08