Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
84s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
24/07/2023, 08:58
Static task
static1
Behavioral task
behavioral1
Sample
cf46fce43b4932f468c7486db629642b6db73d6abff2fbd3e3dae5852c0a6c4a.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
cf46fce43b4932f468c7486db629642b6db73d6abff2fbd3e3dae5852c0a6c4a.exe
Resource
win10v2004-20230703-en
General
-
Target
cf46fce43b4932f468c7486db629642b6db73d6abff2fbd3e3dae5852c0a6c4a.exe
-
Size
272KB
-
MD5
98560ac66abb8cd49d392a94bdd3f800
-
SHA1
536252aac2c6c5af30d875d68faca5e7ec29fb58
-
SHA256
cf46fce43b4932f468c7486db629642b6db73d6abff2fbd3e3dae5852c0a6c4a
-
SHA512
e029bd4a147f9de064790003bdbf6d4528e124bc84936d41e97bdc75123c950dfa5e516c6ce1aafeaf53d2693245ec5f301a4b6bff39164b2b88a99915866da3
-
SSDEEP
6144:qmuKwDfd8qa+7yfxuhCtzV3eL+kxxODGrRWjH:DtefDOtzN+ZjO6rw
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2304 Un_A.exe -
Loads dropped DLL 2 IoCs
pid Process 2304 Un_A.exe 2304 Un_A.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2304 Un_A.exe 2304 Un_A.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1492 wrote to memory of 2304 1492 cf46fce43b4932f468c7486db629642b6db73d6abff2fbd3e3dae5852c0a6c4a.exe 86 PID 1492 wrote to memory of 2304 1492 cf46fce43b4932f468c7486db629642b6db73d6abff2fbd3e3dae5852c0a6c4a.exe 86 PID 1492 wrote to memory of 2304 1492 cf46fce43b4932f468c7486db629642b6db73d6abff2fbd3e3dae5852c0a6c4a.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf46fce43b4932f468c7486db629642b6db73d6abff2fbd3e3dae5852c0a6c4a.exe"C:\Users\Admin\AppData\Local\Temp\cf46fce43b4932f468c7486db629642b6db73d6abff2fbd3e3dae5852c0a6c4a.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe"C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2304
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD51cc87d2b5a79b18f133b4f944e2f2f74
SHA198e0ddb727c76e06be1668434d754e5b80a0c154
SHA256de1177a4bd1c56c3555f366d40b37d7dd9cb25e16c4973d0a4d22bf9a8af7aed
SHA512d8fee1c09fef9af4e1f38baaffa3a6d059713b14ecad900815c086cc22855644fcdeacd6bba31ea6e6925831e650f7b0d34e6dea4c57a978fb4f5bf0cd6d72a9
-
Filesize
98KB
MD5b7f044787bb5a0c1eb43907c061c1ac0
SHA184675f05e0e406482a688c61e0dee35b9a8fb390
SHA2564787e95796035dda92a6cbff56ffddde5ace96f5e46f0f40d2998189ccd6e7ce
SHA5127f0ebc15ee74050a8b493f2c944fc6551056efedde60193be76d4115d28b10f06cc9a859cb42135deee56d614d2ca90e432627f30432d303320dd41fc7fcde6f
-
Filesize
98KB
MD5b7f044787bb5a0c1eb43907c061c1ac0
SHA184675f05e0e406482a688c61e0dee35b9a8fb390
SHA2564787e95796035dda92a6cbff56ffddde5ace96f5e46f0f40d2998189ccd6e7ce
SHA5127f0ebc15ee74050a8b493f2c944fc6551056efedde60193be76d4115d28b10f06cc9a859cb42135deee56d614d2ca90e432627f30432d303320dd41fc7fcde6f
-
Filesize
272KB
MD598560ac66abb8cd49d392a94bdd3f800
SHA1536252aac2c6c5af30d875d68faca5e7ec29fb58
SHA256cf46fce43b4932f468c7486db629642b6db73d6abff2fbd3e3dae5852c0a6c4a
SHA512e029bd4a147f9de064790003bdbf6d4528e124bc84936d41e97bdc75123c950dfa5e516c6ce1aafeaf53d2693245ec5f301a4b6bff39164b2b88a99915866da3
-
Filesize
272KB
MD598560ac66abb8cd49d392a94bdd3f800
SHA1536252aac2c6c5af30d875d68faca5e7ec29fb58
SHA256cf46fce43b4932f468c7486db629642b6db73d6abff2fbd3e3dae5852c0a6c4a
SHA512e029bd4a147f9de064790003bdbf6d4528e124bc84936d41e97bdc75123c950dfa5e516c6ce1aafeaf53d2693245ec5f301a4b6bff39164b2b88a99915866da3