Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
23/07/2023, 15:56
Static task
static1
Behavioral task
behavioral1
Sample
NA_NA_123d9873989f98exeexe_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
NA_NA_123d9873989f98exeexe_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
NA_NA_123d9873989f98exeexe_JC.exe
-
Size
409KB
-
MD5
123d9873989f98eb317693a5f98e5295
-
SHA1
2f62104fbc6d1360077bf6c0998c718a96967d00
-
SHA256
90f8a7d59a197b8737a608dc217e0841c221753e645375b4d69cdbea8ec08aed
-
SHA512
3639af60d6b0108ce96e9165218a71f2fca83312804ce6239edac039eb4a52c6516eaf5b46df574bca0f80083a6da7ccad9f98a19bb698bef91898ed55418324
-
SSDEEP
12288:AplrVbDdQaqdS/ofraFErH8uB2Wm0SXsNr5FU:cxRQ+Fucuvm0as
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 5032 parameter.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Documentation\parameter.exe NA_NA_123d9873989f98exeexe_JC.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1560 NA_NA_123d9873989f98exeexe_JC.exe 1560 NA_NA_123d9873989f98exeexe_JC.exe 1560 NA_NA_123d9873989f98exeexe_JC.exe 1560 NA_NA_123d9873989f98exeexe_JC.exe 5032 parameter.exe 5032 parameter.exe 5032 parameter.exe 5032 parameter.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1560 wrote to memory of 5032 1560 NA_NA_123d9873989f98exeexe_JC.exe 86 PID 1560 wrote to memory of 5032 1560 NA_NA_123d9873989f98exeexe_JC.exe 86 PID 1560 wrote to memory of 5032 1560 NA_NA_123d9873989f98exeexe_JC.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_123d9873989f98exeexe_JC.exe"C:\Users\Admin\AppData\Local\Temp\NA_NA_123d9873989f98exeexe_JC.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Program Files\Documentation\parameter.exe"C:\Program Files\Documentation\parameter.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5032
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
409KB
MD5d3edc03d552afadb500d7bb53fb6aff1
SHA1abc7c6a5598b08ec402e810ddda03d0b677d2cd6
SHA256dccb620d65588e8bc3e18aadb064162b988c03368bcfe6104b1b358dd0e015db
SHA512b772ddc7daee70be9462f81c626f986fcdfa4d78712f3a81fa5958d6d80189e4002d0670af5a555c1b8ad201e83da94ee23163e123db77b3ccb6d3b16f56ef76
-
Filesize
409KB
MD5d3edc03d552afadb500d7bb53fb6aff1
SHA1abc7c6a5598b08ec402e810ddda03d0b677d2cd6
SHA256dccb620d65588e8bc3e18aadb064162b988c03368bcfe6104b1b358dd0e015db
SHA512b772ddc7daee70be9462f81c626f986fcdfa4d78712f3a81fa5958d6d80189e4002d0670af5a555c1b8ad201e83da94ee23163e123db77b3ccb6d3b16f56ef76