Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
184s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
25/05/2023, 04:48
Static task
static1
Behavioral task
behavioral1
Sample
4743379d71616bcb671416d64ced8ea1c9779f2d76c6f73d8a2a0082ced894a3.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
4743379d71616bcb671416d64ced8ea1c9779f2d76c6f73d8a2a0082ced894a3.exe
Resource
win10-20230220-en
General
-
Target
4743379d71616bcb671416d64ced8ea1c9779f2d76c6f73d8a2a0082ced894a3.exe
-
Size
7.1MB
-
MD5
eaee7a5d73cab217533f3c9b7f7658a4
-
SHA1
e1960e10c06374bd81f7d5512d66b9aecff6eb47
-
SHA256
4743379d71616bcb671416d64ced8ea1c9779f2d76c6f73d8a2a0082ced894a3
-
SHA512
d483f91f80359d74bbd3961a8161b083d1e37a954d28c4a02529b711f5c45c8119697a237d056bc11f2c0bdd66cc8042735212c35df685284e79e01abe4a685c
-
SSDEEP
98304:q1w7BkKSmIysFQ1zGogIm+8+2IpZeH9wLbZy:q18kKSmVsCN16l1i0Ong
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3588 WindowsHolographicDevicesMicrosoft-QMU7.9.4.1.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000\Software\Microsoft\Windows\CurrentVersion\Run 4743379d71616bcb671416d64ced8ea1c9779f2d76c6f73d8a2a0082ced894a3.exe Set value (str) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsHolographicDevicesMicrosoft-QMU7.9.4.1 = "C:\\ProgramData\\WindowsHolographicDevicesMicrosoft-QMU7.9.4.1\\WindowsHolographicDevicesMicrosoft-QMU7.9.4.1.exe" 4743379d71616bcb671416d64ced8ea1c9779f2d76c6f73d8a2a0082ced894a3.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3632 wrote to memory of 3588 3632 4743379d71616bcb671416d64ced8ea1c9779f2d76c6f73d8a2a0082ced894a3.exe 66 PID 3632 wrote to memory of 3588 3632 4743379d71616bcb671416d64ced8ea1c9779f2d76c6f73d8a2a0082ced894a3.exe 66
Processes
-
C:\Users\Admin\AppData\Local\Temp\4743379d71616bcb671416d64ced8ea1c9779f2d76c6f73d8a2a0082ced894a3.exe"C:\Users\Admin\AppData\Local\Temp\4743379d71616bcb671416d64ced8ea1c9779f2d76c6f73d8a2a0082ced894a3.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\ProgramData\WindowsHolographicDevicesMicrosoft-QMU7.9.4.1\WindowsHolographicDevicesMicrosoft-QMU7.9.4.1.exeC:\ProgramData\WindowsHolographicDevicesMicrosoft-QMU7.9.4.1\WindowsHolographicDevicesMicrosoft-QMU7.9.4.1.exe2⤵
- Executes dropped EXE
PID:3588
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\WindowsHolographicDevicesMicrosoft-QMU7.9.4.1\WindowsHolographicDevicesMicrosoft-QMU7.9.4.1.exe
Filesize757.1MB
MD5c4bcf29b441e736e9e01104e9092359b
SHA14864601d944c8092fa6e88697feefe27eab93698
SHA256bf764222a738e6b8aa5d6fb8057f89ddd2afb0fa919c47e36bc257bf9414d260
SHA512dc9710ee4a2a4d4597bcc979d7b1e4a94caba0cad2ab9b5e37be4814e4f3ba2c24a3f31536f4d2cad7d4a509e92a47da56068c5d8716685031f35bfc522aa072
-
C:\ProgramData\WindowsHolographicDevicesMicrosoft-QMU7.9.4.1\WindowsHolographicDevicesMicrosoft-QMU7.9.4.1.exe
Filesize757.1MB
MD5c4bcf29b441e736e9e01104e9092359b
SHA14864601d944c8092fa6e88697feefe27eab93698
SHA256bf764222a738e6b8aa5d6fb8057f89ddd2afb0fa919c47e36bc257bf9414d260
SHA512dc9710ee4a2a4d4597bcc979d7b1e4a94caba0cad2ab9b5e37be4814e4f3ba2c24a3f31536f4d2cad7d4a509e92a47da56068c5d8716685031f35bfc522aa072