Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
03/08/2023, 12:46
Behavioral task
behavioral1
Sample
92293befae5fa3cc80d1beab93993b254742072879b296f89e9039bdb7a4edf4.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
92293befae5fa3cc80d1beab93993b254742072879b296f89e9039bdb7a4edf4.exe
Resource
win10v2004-20230703-en
General
-
Target
92293befae5fa3cc80d1beab93993b254742072879b296f89e9039bdb7a4edf4.exe
-
Size
247KB
-
MD5
7e51245673d182bcf760ca81e3b848e6
-
SHA1
022aff2deaee21ace084680ba5c23657ca1c527e
-
SHA256
92293befae5fa3cc80d1beab93993b254742072879b296f89e9039bdb7a4edf4
-
SHA512
a06ed6a9c5f8d06ade42b1cc385d9363b1310e08080d4bd2ace264963bcc8a0c6088fc7eaff6a641ce113a74f3d713ee86b0ba51fccdd89cc1ff56f5ad25e432
-
SSDEEP
6144:JMooVQnnOBccnskYPmTpUxrr1XRA7WHxWoN+J0EafCUSYibN6WGH:qQnO/s1mTpG5bUo4bafVibvk
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4080-133-0x0000000000400000-0x0000000001C5B000-memory.dmp upx behavioral2/memory/4080-135-0x0000000000400000-0x0000000001C5B000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 3764 systeminfo.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3044 PING.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4080 wrote to memory of 4400 4080 92293befae5fa3cc80d1beab93993b254742072879b296f89e9039bdb7a4edf4.exe 86 PID 4080 wrote to memory of 4400 4080 92293befae5fa3cc80d1beab93993b254742072879b296f89e9039bdb7a4edf4.exe 86 PID 4080 wrote to memory of 4400 4080 92293befae5fa3cc80d1beab93993b254742072879b296f89e9039bdb7a4edf4.exe 86 PID 4400 wrote to memory of 3764 4400 cmd.exe 88 PID 4400 wrote to memory of 3764 4400 cmd.exe 88 PID 4400 wrote to memory of 3764 4400 cmd.exe 88 PID 4400 wrote to memory of 3044 4400 cmd.exe 91 PID 4400 wrote to memory of 3044 4400 cmd.exe 91 PID 4400 wrote to memory of 3044 4400 cmd.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\92293befae5fa3cc80d1beab93993b254742072879b296f89e9039bdb7a4edf4.exe"C:\Users\Admin\AppData\Local\Temp\92293befae5fa3cc80d1beab93993b254742072879b296f89e9039bdb7a4edf4.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c systeminfo>>C:\Windows\temp\setup_gitlog.txt&ping 8.8.8.8>>C:\Windows\temp\setup_gitlog.txt2⤵
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Windows\SysWOW64\systeminfo.exesysteminfo3⤵
- Gathers system information
PID:3764
-
-
C:\Windows\SysWOW64\PING.EXEping 8.8.8.83⤵
- Runs ping.exe
PID:3044
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33B
MD5346bbdef8e66561ce4c33013160d7c75
SHA1023e40d5eb04b2d7e8346ea0c9a62b05d372abec
SHA256ce357dc9d96cbb6933f7895d5fee9052b72733c2db9fc32b1555761b1bd0c277
SHA512f2fd0412846455ee0f47f9e88192ea4c6ee60c3118be40a44c9b626566652ed46b1c3a0708a7ec6feba7a9cafc61091a2a1c6cb864a99a081bb842625040594f