Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
21/07/2023, 13:40
Static task
static1
1 signatures
General
-
Target
443aaac9259917f8116829fc36dbf0569034aad632777d9cc67200b32338cd84.exe
-
Size
3.2MB
-
MD5
bdf59f927ef99ae5b7a45d8e3d05700f
-
SHA1
bb7724f28e1835b04e943e7ff6ad82b0fd8b8a7e
-
SHA256
443aaac9259917f8116829fc36dbf0569034aad632777d9cc67200b32338cd84
-
SHA512
7fdd428eb404e199569cbe4af4747fe6e068e44c448f70fc9fea02faedce05974903961a4679a7f473bfa84d08c8b2c0dee466d5870fe80d11fb6667f2e83cb1
-
SSDEEP
49152:lAZgWNUovSitGs0pXGimIricmNUDAiG1eAkvKUFOGZcApfiJoxF:lARUXgIiLiTlvKUsG2ApWoxF
Malware Config
Signatures
-
.NET Reactor proctector 1 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral1/memory/2956-134-0x0000000000590000-0x00000000008C8000-memory.dmp net_reactor -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2956 set thread context of 1168 2956 443aaac9259917f8116829fc36dbf0569034aad632777d9cc67200b32338cd84.exe 92 -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 1168 MsBuild.exe 1168 MsBuild.exe 1168 MsBuild.exe 1168 MsBuild.exe 1168 MsBuild.exe 1168 MsBuild.exe 1168 MsBuild.exe 1168 MsBuild.exe 1168 MsBuild.exe 1168 MsBuild.exe 1168 MsBuild.exe 1168 MsBuild.exe 1168 MsBuild.exe 1168 MsBuild.exe 1168 MsBuild.exe 1168 MsBuild.exe 1168 MsBuild.exe 1168 MsBuild.exe 1168 MsBuild.exe 1168 MsBuild.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2956 443aaac9259917f8116829fc36dbf0569034aad632777d9cc67200b32338cd84.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2956 wrote to memory of 1168 2956 443aaac9259917f8116829fc36dbf0569034aad632777d9cc67200b32338cd84.exe 92 PID 2956 wrote to memory of 1168 2956 443aaac9259917f8116829fc36dbf0569034aad632777d9cc67200b32338cd84.exe 92 PID 2956 wrote to memory of 1168 2956 443aaac9259917f8116829fc36dbf0569034aad632777d9cc67200b32338cd84.exe 92 PID 2956 wrote to memory of 1168 2956 443aaac9259917f8116829fc36dbf0569034aad632777d9cc67200b32338cd84.exe 92 PID 2956 wrote to memory of 1168 2956 443aaac9259917f8116829fc36dbf0569034aad632777d9cc67200b32338cd84.exe 92 PID 2956 wrote to memory of 1168 2956 443aaac9259917f8116829fc36dbf0569034aad632777d9cc67200b32338cd84.exe 92 PID 2956 wrote to memory of 1168 2956 443aaac9259917f8116829fc36dbf0569034aad632777d9cc67200b32338cd84.exe 92 PID 2956 wrote to memory of 1168 2956 443aaac9259917f8116829fc36dbf0569034aad632777d9cc67200b32338cd84.exe 92 PID 2956 wrote to memory of 1168 2956 443aaac9259917f8116829fc36dbf0569034aad632777d9cc67200b32338cd84.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\443aaac9259917f8116829fc36dbf0569034aad632777d9cc67200b32338cd84.exe"C:\Users\Admin\AppData\Local\Temp\443aaac9259917f8116829fc36dbf0569034aad632777d9cc67200b32338cd84.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1168
-