Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
18/05/2023, 13:57
Static task
static1
Behavioral task
behavioral1
Sample
b8b1922c587d55cd3bdcbda9c5b6b0ace495d14effe54806e10e4b3963af9f2b.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
b8b1922c587d55cd3bdcbda9c5b6b0ace495d14effe54806e10e4b3963af9f2b.exe
Resource
win10v2004-20230220-en
General
-
Target
b8b1922c587d55cd3bdcbda9c5b6b0ace495d14effe54806e10e4b3963af9f2b.exe
-
Size
4.8MB
-
MD5
93a608c7a55447b6827e56d53a7b6fea
-
SHA1
78740b5a68542019a90f7c9be78121d5b92a0d3b
-
SHA256
b8b1922c587d55cd3bdcbda9c5b6b0ace495d14effe54806e10e4b3963af9f2b
-
SHA512
f749cd36ee75cad310f4f921b5c8e59d4c6c3ce8673f7ab66d20ff9e7a4b2f8736d9c541b27dc17ea4a84b1c9948b4813a8ba57bdde8f77107edb150ec4ecaea
-
SSDEEP
49152:RA/n/LwTVwv9iGLsenhpUVoygcYM9cJah4GR1fwJtNMRIuk+qnGgvB/dV4Z:cZaDj3wJtNMkG4T
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3680 MicrosoftUSOPrivate-ver1.5.3.5.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Windows\CurrentVersion\Run b8b1922c587d55cd3bdcbda9c5b6b0ace495d14effe54806e10e4b3963af9f2b.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicrosoftUSOPrivate-ver1.5.3.5 = "C:\\ProgramData\\MicrosoftUSOPrivate-ver1.5.3.5\\MicrosoftUSOPrivate-ver1.5.3.5.exe" b8b1922c587d55cd3bdcbda9c5b6b0ace495d14effe54806e10e4b3963af9f2b.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2676 wrote to memory of 3680 2676 b8b1922c587d55cd3bdcbda9c5b6b0ace495d14effe54806e10e4b3963af9f2b.exe 83 PID 2676 wrote to memory of 3680 2676 b8b1922c587d55cd3bdcbda9c5b6b0ace495d14effe54806e10e4b3963af9f2b.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\b8b1922c587d55cd3bdcbda9c5b6b0ace495d14effe54806e10e4b3963af9f2b.exe"C:\Users\Admin\AppData\Local\Temp\b8b1922c587d55cd3bdcbda9c5b6b0ace495d14effe54806e10e4b3963af9f2b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\ProgramData\MicrosoftUSOPrivate-ver1.5.3.5\MicrosoftUSOPrivate-ver1.5.3.5.exeC:\ProgramData\MicrosoftUSOPrivate-ver1.5.3.5\MicrosoftUSOPrivate-ver1.5.3.5.exe2⤵
- Executes dropped EXE
PID:3680
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
228.1MB
MD578a7095cf987725e2e8e3bc8d5d8c7d0
SHA19682d0539bb3142cd039d41939491edc2c0845c0
SHA256d6ec9b987994cad7bce6fc1134f3d8090b886455cfbe115275038f6980254c2a
SHA51264426966d463600f24b3360eb1b62f7586ed0654efbec4a61fdf6662f74129b99a09e4f32fd4f3b92b47bf89b091d6dd70fafcadeb77d866fd8a1b73c0bdf261
-
Filesize
224.2MB
MD58db1cca274d4a3521ba482c7f370e88d
SHA14dd7a8706838d320ae7568ce2749c6247d7b8b4e
SHA2566279284e2eb9734bdf011fddf446230a53302c74f7e7538a744d94a8743f19c9
SHA512b6fcadea29cd4ccec6ecd4f9d3489f4877676b7965406970f3cb36120e4a8d8c2f124f178aafc259c724e9d3ddc15ba8e2077522355a73a0344b90903b6fa657