Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
91s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 19:52
Behavioral task
behavioral1
Sample
f2f30d65b2dc6f9951e13d44b6f659dff1a0da10549131d5d6a7316ca87622f0.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f2f30d65b2dc6f9951e13d44b6f659dff1a0da10549131d5d6a7316ca87622f0.exe
Resource
win10v2004-20220812-en
General
-
Target
f2f30d65b2dc6f9951e13d44b6f659dff1a0da10549131d5d6a7316ca87622f0.exe
-
Size
45KB
-
MD5
30136420f67e5f3d4f6d992c0a2b45c0
-
SHA1
61500185141906c9dc29696c3843d8156cf7ace8
-
SHA256
f2f30d65b2dc6f9951e13d44b6f659dff1a0da10549131d5d6a7316ca87622f0
-
SHA512
70e7798ee7c82715a14c77af8f840a49b167ce290fd36026ee609264557105b0a377104f098ad93308c27dcc8e8d3f1861a5273b377bc4a3321bcc440026a799
-
SSDEEP
768:6x2ZiddEC7lRaqtcSI3QpG3bvb2m9RkUT4rdlnjUsWc5ax3deVFv0fGJPLVbPY6m:6ATWlsCNI3bvyyb2FjUmMe+GJP5jY6/+
Malware Config
Signatures
-
resource yara_rule behavioral2/files/0x0007000000022f67-133.dat aspack_v212_v242 behavioral2/files/0x0007000000022f67-134.dat aspack_v212_v242 -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run livevideo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ErrorReportSent = "C:\\Users\\Admin\\AppData\\Roaming\\livevideo.exe" livevideo.exe -
Executes dropped EXE 1 IoCs
pid Process 1560 livevideo.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1264 wrote to memory of 1560 1264 f2f30d65b2dc6f9951e13d44b6f659dff1a0da10549131d5d6a7316ca87622f0.exe 81 PID 1264 wrote to memory of 1560 1264 f2f30d65b2dc6f9951e13d44b6f659dff1a0da10549131d5d6a7316ca87622f0.exe 81 PID 1264 wrote to memory of 1560 1264 f2f30d65b2dc6f9951e13d44b6f659dff1a0da10549131d5d6a7316ca87622f0.exe 81 PID 1264 wrote to memory of 2364 1264 f2f30d65b2dc6f9951e13d44b6f659dff1a0da10549131d5d6a7316ca87622f0.exe 82 PID 1264 wrote to memory of 2364 1264 f2f30d65b2dc6f9951e13d44b6f659dff1a0da10549131d5d6a7316ca87622f0.exe 82 PID 1264 wrote to memory of 2364 1264 f2f30d65b2dc6f9951e13d44b6f659dff1a0da10549131d5d6a7316ca87622f0.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\f2f30d65b2dc6f9951e13d44b6f659dff1a0da10549131d5d6a7316ca87622f0.exe"C:\Users\Admin\AppData\Local\Temp\f2f30d65b2dc6f9951e13d44b6f659dff1a0da10549131d5d6a7316ca87622f0.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Users\Admin\AppData\Roaming\livevideo.exeC:\Users\Admin\AppData\Roaming\livevideo.exe2⤵
- Adds policy Run key to start application
- Executes dropped EXE
PID:1560
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c UNISTA~1.BAT2⤵PID:2364
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88B
MD5c96d7a7e71763ecb0fe4e604132ee0f8
SHA13b4c74237328bd4a7ae8ee10d72a28ca84887e06
SHA256b9954ca4696fc4b7a871d497d304b30e53decda9532d07fa598b237e2eef125a
SHA512071e04b4c86413f9ac20cda2d87f0dc6f71e0e8b9a0118c04e8eab4ae09536a803da2aec23d859e6e0675c2b554f67238c69490d047aa5a1b1d95423624d33f4
-
Filesize
45KB
MD50272bc899e3d636191a3daa8ce435f39
SHA15ca49ce0448773205636975d4e4ffbafa25cb2bb
SHA25623b33449f86a7f20dbc26ee8186c3d8acea634b0c95eee370f35cf62d5225d6a
SHA5129c02075e6144945ac8d77b4c537b199d4fc1c054c67cec0402c9eda34706cd28f1e91fe0e1eedb38f915a66ce76690b15afba6c027efac508c508a2d104f6999
-
Filesize
45KB
MD50272bc899e3d636191a3daa8ce435f39
SHA15ca49ce0448773205636975d4e4ffbafa25cb2bb
SHA25623b33449f86a7f20dbc26ee8186c3d8acea634b0c95eee370f35cf62d5225d6a
SHA5129c02075e6144945ac8d77b4c537b199d4fc1c054c67cec0402c9eda34706cd28f1e91fe0e1eedb38f915a66ce76690b15afba6c027efac508c508a2d104f6999