Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    115s
  • max time network
    159s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    15/06/2023, 05:49

General

  • Target

    fl_patch_installer_20_6_2.exe

  • Size

    81.1MB

  • MD5

    0f7678a0bdf9e87662102f6ae7afc58e

  • SHA1

    a206cd1542a3df31eda742ed776f178ed7eff450

  • SHA256

    785109a02929721c9c6b550f87377bffced9d6d3db38b4989324f36fc213bf95

  • SHA512

    a24bcea62ad1ca799875d65c6492200ab110eb1675c672f96afc01f4a30b51790b9efdddf8307b354ba86fed316ae7003acddf1d5cf1720562391e629076ab04

  • SSDEEP

    1572864:p72B/p+5jpkwObyhNP+7VuY9ml1UFBSq709w+GQ0IL:NE0jpkwOb8NPbPCFBSW6LbL

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fl_patch_installer_20_6_2.exe
    "C:\Users\Admin\AppData\Local\Temp\fl_patch_installer_20_6_2.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2288
    • C:\Users\Admin\AppData\Local\Temp\is-AQO6E.tmp\fl_patch_installer_20_6_2.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-AQO6E.tmp\fl_patch_installer_20_6_2.tmp" /SL5="$8004E,84654853,125440,C:\Users\Admin\AppData\Local\Temp\fl_patch_installer_20_6_2.exe"
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      PID:2496
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:800

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Plugins\Fruity\Generators\Wasp XT\is-TG0V4.tmp

      Filesize

      3.4MB

      MD5

      8e641790c883e6ea791875d627653499

      SHA1

      c4e76c3c8b3db60e1c17e1eb2b35fc03c39c868e

      SHA256

      2e25e6ca2229cf09f3e22fb883f725b5e870410ea922f43cd7d0a75040a0bf0d

      SHA512

      212d81a9787b45542871d9a0eaaa54e5c8484c634f840ba726940f240bbbffbba04bb36d45689a37c051d15304f6b3426a7de14a49f1c16b111b07f8ad810e63

    • C:\Users\Admin\AppData\Local\Temp\is-AQO6E.tmp\fl_patch_installer_20_6_2.tmp

      Filesize

      1.1MB

      MD5

      006c402fd22016b5a5a1c2180ca5ccc9

      SHA1

      dc8dae24ef11181d145c8d9f6f245f3b67a3e1d0

      SHA256

      5b246db2dfc1a5d000b0662e2a58e1cb9f89fdc87945597ec1e1f2f245fd7898

      SHA512

      caea20f48421f7918c9ead0316decba60460c74ff878666e0a48ae1e5b2eb41a37b03c1a59bc3aa416990e49cae155e19894461c28c225f4f9b42e184db289b1

    • memory/2288-121-0x0000000000400000-0x0000000000429000-memory.dmp

      Filesize

      164KB

    • memory/2288-236-0x0000000000400000-0x0000000000429000-memory.dmp

      Filesize

      164KB

    • memory/2288-128-0x0000000000400000-0x0000000000429000-memory.dmp

      Filesize

      164KB

    • memory/2496-134-0x0000000000400000-0x000000000052E000-memory.dmp

      Filesize

      1.2MB

    • memory/2496-130-0x0000000000690000-0x0000000000691000-memory.dmp

      Filesize

      4KB

    • memory/2496-136-0x0000000000400000-0x000000000052E000-memory.dmp

      Filesize

      1.2MB

    • memory/2496-144-0x0000000000400000-0x000000000052E000-memory.dmp

      Filesize

      1.2MB

    • memory/2496-214-0x0000000000400000-0x000000000052E000-memory.dmp

      Filesize

      1.2MB

    • memory/2496-129-0x0000000000400000-0x000000000052E000-memory.dmp

      Filesize

      1.2MB

    • memory/2496-234-0x0000000000400000-0x000000000052E000-memory.dmp

      Filesize

      1.2MB

    • memory/2496-127-0x0000000000690000-0x0000000000691000-memory.dmp

      Filesize

      4KB