Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
15/06/2023, 22:18
Static task
static1
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
setup.exe
Resource
win10v2004-20230220-en
General
-
Target
setup.exe
-
Size
3.3MB
-
MD5
aa558914109bc06afbdbd8b95978cc2c
-
SHA1
8c95d95f6c63a2ea14801e8cebc7e4cc57ee04b4
-
SHA256
beb2f55cbadbdbb08ec0a923d9fa30a5f6336f344179e40ad20d9f610a8ffc58
-
SHA512
1d6b84ad30d0b4515b9b91ef765f6dd2b31aff2af5ea3341d0d276136ec725010b1273708bf7f6f5f4bff24cb53e4e48699eddeeb92dbca0db18d0b330b530f4
-
SSDEEP
49152:bG2cUy+P2Tq2+OBy17sdGh9prS8fNxUep+/J2NyyGQfZyM/dayFMTMUWyKsf7e/:K2krq9OU1YdGDQ+dMoGyyvyFLXio
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4292 setup.tmp -
Loads dropped DLL 3 IoCs
pid Process 4292 setup.tmp 4292 setup.tmp 4292 setup.tmp -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4292 setup.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4152 wrote to memory of 4292 4152 setup.exe 86 PID 4152 wrote to memory of 4292 4152 setup.exe 86 PID 4152 wrote to memory of 4292 4152 setup.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Users\Admin\AppData\Local\Temp\is-GO704.tmp\setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-GO704.tmp\setup.tmp" /SL5="$A003E,2956131,137216,C:\Users\Admin\AppData\Local\Temp\setup.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
PID:4292
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
117KB
MD5376b3bb43c9463d4136e81e610bb5907
SHA1322d37cd519f1f00ad374d418a2c4cede91148ca
SHA256a765370605ad8529763aaafb9fc814b194d49dca780e11b7989f3286a9f3e586
SHA51236440598470853cc095c6bd1ff0660f203b876894b629eb5e3bd0ec5380ab91faf655c01f8e2cbcaad2fb0810c0fb4527fc452bace94dcf243f30c04a5f14083
-
Filesize
37KB
MD53b68cd074c5545900a4274c8fc429566
SHA1e09b98223ac6a7f3a0b7b7547d19fca8f762dba1
SHA2566107a008ba34903651af650a05eb2abc07c86d5bb69e42e98b4cd2fad0018ec9
SHA51265bb2f170c173d17613b46beb5124dc4b05c28d8467ee08ce1cbaf035992d304de6c25b7253c2bcc5780aeb587ec77c385e7c95fed276e2f94212eb777762da7
-
Filesize
37KB
MD5619bf9ddcb5fe39ee9e5b0167e7f4f0d
SHA16da8c0d2407d5221172765b00452efa0f361902f
SHA256609661a14733f6e9c2c2f2ff9c274f8a4cbedaff4dd32049aa5161f8d7083d6a
SHA512a89fc731805e83f889f408fe3fea769d0e44faf1e1dd37d3569bbf57a6086b1ffc8783778e0be8236447c7661c44051b2d4b1d3a643f7ebc35f6ef0625c6897a
-
Filesize
37KB
MD5619bf9ddcb5fe39ee9e5b0167e7f4f0d
SHA16da8c0d2407d5221172765b00452efa0f361902f
SHA256609661a14733f6e9c2c2f2ff9c274f8a4cbedaff4dd32049aa5161f8d7083d6a
SHA512a89fc731805e83f889f408fe3fea769d0e44faf1e1dd37d3569bbf57a6086b1ffc8783778e0be8236447c7661c44051b2d4b1d3a643f7ebc35f6ef0625c6897a
-
Filesize
75KB
MD5a2eee508e6a51c6335650532e05ac550
SHA18703fb138bb8443f17c0c24da7edd69b1f2660b1
SHA25675fb2984e1b06f4278fb7b3c77e9fec84e02a3b4bf82d35120f8cbe7bdbc76bf
SHA51214e1abea3109c17f1fbe6ec455593bf91ba1b811ea302806a83a97a96bf582f1c46e8fe635e1d8739c5c007298eabd41311e07e50961ec2084cf97bde0595370
-
Filesize
75KB
MD5a2eee508e6a51c6335650532e05ac550
SHA18703fb138bb8443f17c0c24da7edd69b1f2660b1
SHA25675fb2984e1b06f4278fb7b3c77e9fec84e02a3b4bf82d35120f8cbe7bdbc76bf
SHA51214e1abea3109c17f1fbe6ec455593bf91ba1b811ea302806a83a97a96bf582f1c46e8fe635e1d8739c5c007298eabd41311e07e50961ec2084cf97bde0595370
-
Filesize
1.4MB
MD5f31f23df86367d6c692ef8606c477080
SHA1724854623e347705d2dd374876a591c8440e862a
SHA2563c58b63918fd352de74822979fff32bc412543ba77e65e94db35aac5644d820b
SHA512b5b8f644f4ad71d44bc08813bdfdfa31bef2e7cd553ba0cd93edb174cb30f5ef00b2c7b45f99c49cd81df44540658725b7952261ba7985e82daf52889960a807
-
Filesize
1.4MB
MD5f31f23df86367d6c692ef8606c477080
SHA1724854623e347705d2dd374876a591c8440e862a
SHA2563c58b63918fd352de74822979fff32bc412543ba77e65e94db35aac5644d820b
SHA512b5b8f644f4ad71d44bc08813bdfdfa31bef2e7cd553ba0cd93edb174cb30f5ef00b2c7b45f99c49cd81df44540658725b7952261ba7985e82daf52889960a807