Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
26/05/2023, 09:10
Static task
static1
Behavioral task
behavioral1
Sample
clp2.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
clp2.exe
Resource
win10v2004-20230220-en
General
-
Target
clp2.exe
-
Size
7.1MB
-
MD5
5e1dac9feac98acbe6fd54766f3d1d1e
-
SHA1
cec1b04e2440a2f90e6d77ad77518dda1e7be404
-
SHA256
1bceaf4f262ef3c132b824d2ac4727b33b113b974665015ccd265e347dba02e2
-
SHA512
89b5e7c3604291807a5883cfe85027cef12f92ca429af5f648c0a564cbcfbe03123be6882ab6937d1386431e5ae25123b9866592bc2733654e4500f55796c3f2
-
SSDEEP
98304:xIZc7bvM1hiOh6lj5PXm6hC59xph1avNQHbsNhILM5WdN3SzK9zu:xI6/Ohhh6lY6I5phIvNQCILM5WLC+9C
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 5084 regid.1991-06.com.microsoftDocuments-DPX45.0.3.5.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Windows\CurrentVersion\Run clp2.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\regid.1991-06.com.microsoftDocuments-DPX45.0.3.5 = "C:\\ProgramData\\regid.1991-06.com.microsoftDocuments-DPX45.0.3.5\\regid.1991-06.com.microsoftDocuments-DPX45.0.3.5.exe" clp2.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3792 wrote to memory of 5084 3792 clp2.exe 82 PID 3792 wrote to memory of 5084 3792 clp2.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\clp2.exe"C:\Users\Admin\AppData\Local\Temp\clp2.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3792 -
C:\ProgramData\regid.1991-06.com.microsoftDocuments-DPX45.0.3.5\regid.1991-06.com.microsoftDocuments-DPX45.0.3.5.exeC:\ProgramData\regid.1991-06.com.microsoftDocuments-DPX45.0.3.5\regid.1991-06.com.microsoftDocuments-DPX45.0.3.5.exe2⤵
- Executes dropped EXE
PID:5084
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\regid.1991-06.com.microsoftDocuments-DPX45.0.3.5\regid.1991-06.com.microsoftDocuments-DPX45.0.3.5.exe
Filesize757.1MB
MD5a5b74ec7797837c58a6c7c4832c7f095
SHA1f47be4d0ac00802c34bbd2e9de63e2d0e38ddb47
SHA25657a1085e1628454f3c3f2ae8ebda4741ed3ff939a63ba0059582d64e6a43c894
SHA5129e54bb01d7bb5ba0fb842082105fb827f6aa74c403387a4919f5c00330e67d29aaad996064f37993d5a116d8b4e7a41d58277ea5e38103f8918955ef6b1d9e66
-
C:\ProgramData\regid.1991-06.com.microsoftDocuments-DPX45.0.3.5\regid.1991-06.com.microsoftDocuments-DPX45.0.3.5.exe
Filesize757.1MB
MD5a5b74ec7797837c58a6c7c4832c7f095
SHA1f47be4d0ac00802c34bbd2e9de63e2d0e38ddb47
SHA25657a1085e1628454f3c3f2ae8ebda4741ed3ff939a63ba0059582d64e6a43c894
SHA5129e54bb01d7bb5ba0fb842082105fb827f6aa74c403387a4919f5c00330e67d29aaad996064f37993d5a116d8b4e7a41d58277ea5e38103f8918955ef6b1d9e66