Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
04/08/2023, 21:05
Static task
static1
Behavioral task
behavioral1
Sample
bd0869ad342f66aaa662d47013c80351546f89ac243c021eb358a07fe7628769.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
bd0869ad342f66aaa662d47013c80351546f89ac243c021eb358a07fe7628769.exe
Resource
win10v2004-20230703-en
General
-
Target
bd0869ad342f66aaa662d47013c80351546f89ac243c021eb358a07fe7628769.exe
-
Size
4.0MB
-
MD5
d5f474152567f74e982ba7462fec87ed
-
SHA1
c0950ed8fcf05fec8dc9d82430bf8362868d49d3
-
SHA256
bd0869ad342f66aaa662d47013c80351546f89ac243c021eb358a07fe7628769
-
SHA512
80622f0ad4d9114b10b22d49d645e71c00f5ac1e40d05e758bf08bba1d691170dac30c07811f55b7d1c088a44b143b24a8e8ff973853399c334d3853663052ac
-
SSDEEP
98304:Wnsmtk2a/qdyX8n0f9FGIt/GoJfXFLs1AEDPCiMuWGBTIqHyFIYBF+oViRoq:ILCqdK3Z/5dnsHWGBvSIcF+odq
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2608 ._cache_bd0869ad342f66aaa662d47013c80351546f89ac243c021eb358a07fe7628769.exe 4596 Synaptics.exe 2324 ._cache_Synaptics.exe -
resource yara_rule behavioral2/files/0x00080000000231ca-138.dat upx behavioral2/files/0x00080000000231ca-166.dat upx behavioral2/memory/2608-176-0x0000000000400000-0x00000000007E0000-memory.dmp upx behavioral2/files/0x00080000000231ca-165.dat upx behavioral2/files/0x00030000000006e1-269.dat upx behavioral2/files/0x00030000000006e1-270.dat upx behavioral2/memory/2608-271-0x0000000000400000-0x00000000007E0000-memory.dmp upx behavioral2/memory/2324-274-0x0000000000400000-0x00000000007E0000-memory.dmp upx behavioral2/memory/2608-278-0x0000000000400000-0x00000000007E0000-memory.dmp upx behavioral2/memory/2324-280-0x0000000000400000-0x00000000007E0000-memory.dmp upx behavioral2/memory/2608-284-0x0000000000400000-0x00000000007E0000-memory.dmp upx behavioral2/memory/2324-286-0x0000000000400000-0x00000000007E0000-memory.dmp upx behavioral2/memory/2608-306-0x0000000000400000-0x00000000007E0000-memory.dmp upx behavioral2/memory/2324-308-0x0000000000400000-0x00000000007E0000-memory.dmp upx behavioral2/memory/2608-312-0x0000000000400000-0x00000000007E0000-memory.dmp upx behavioral2/memory/2324-314-0x0000000000400000-0x00000000007E0000-memory.dmp upx behavioral2/memory/2608-315-0x0000000000400000-0x00000000007E0000-memory.dmp upx behavioral2/memory/2324-317-0x0000000000400000-0x00000000007E0000-memory.dmp upx behavioral2/memory/2608-318-0x0000000000400000-0x00000000007E0000-memory.dmp upx behavioral2/memory/2324-320-0x0000000000400000-0x00000000007E0000-memory.dmp upx behavioral2/memory/2608-321-0x0000000000400000-0x00000000007E0000-memory.dmp upx behavioral2/memory/2324-323-0x0000000000400000-0x00000000007E0000-memory.dmp upx behavioral2/memory/2608-324-0x0000000000400000-0x00000000007E0000-memory.dmp upx behavioral2/memory/2324-326-0x0000000000400000-0x00000000007E0000-memory.dmp upx behavioral2/memory/2608-327-0x0000000000400000-0x00000000007E0000-memory.dmp upx behavioral2/memory/2324-329-0x0000000000400000-0x00000000007E0000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" bd0869ad342f66aaa662d47013c80351546f89ac243c021eb358a07fe7628769.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ bd0869ad342f66aaa662d47013c80351546f89ac243c021eb358a07fe7628769.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2608 ._cache_bd0869ad342f66aaa662d47013c80351546f89ac243c021eb358a07fe7628769.exe 2608 ._cache_bd0869ad342f66aaa662d47013c80351546f89ac243c021eb358a07fe7628769.exe 2324 ._cache_Synaptics.exe 2324 ._cache_Synaptics.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 940 wrote to memory of 2608 940 bd0869ad342f66aaa662d47013c80351546f89ac243c021eb358a07fe7628769.exe 81 PID 940 wrote to memory of 2608 940 bd0869ad342f66aaa662d47013c80351546f89ac243c021eb358a07fe7628769.exe 81 PID 940 wrote to memory of 2608 940 bd0869ad342f66aaa662d47013c80351546f89ac243c021eb358a07fe7628769.exe 81 PID 940 wrote to memory of 4596 940 bd0869ad342f66aaa662d47013c80351546f89ac243c021eb358a07fe7628769.exe 82 PID 940 wrote to memory of 4596 940 bd0869ad342f66aaa662d47013c80351546f89ac243c021eb358a07fe7628769.exe 82 PID 940 wrote to memory of 4596 940 bd0869ad342f66aaa662d47013c80351546f89ac243c021eb358a07fe7628769.exe 82 PID 4596 wrote to memory of 2324 4596 Synaptics.exe 85 PID 4596 wrote to memory of 2324 4596 Synaptics.exe 85 PID 4596 wrote to memory of 2324 4596 Synaptics.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\bd0869ad342f66aaa662d47013c80351546f89ac243c021eb358a07fe7628769.exe"C:\Users\Admin\AppData\Local\Temp\bd0869ad342f66aaa662d47013c80351546f89ac243c021eb358a07fe7628769.exe"1⤵
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Users\Admin\AppData\Local\Temp\._cache_bd0869ad342f66aaa662d47013c80351546f89ac243c021eb358a07fe7628769.exe"C:\Users\Admin\AppData\Local\Temp\._cache_bd0869ad342f66aaa662d47013c80351546f89ac243c021eb358a07fe7628769.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2608
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2324
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.0MB
MD5d5f474152567f74e982ba7462fec87ed
SHA1c0950ed8fcf05fec8dc9d82430bf8362868d49d3
SHA256bd0869ad342f66aaa662d47013c80351546f89ac243c021eb358a07fe7628769
SHA51280622f0ad4d9114b10b22d49d645e71c00f5ac1e40d05e758bf08bba1d691170dac30c07811f55b7d1c088a44b143b24a8e8ff973853399c334d3853663052ac
-
Filesize
4.0MB
MD5d5f474152567f74e982ba7462fec87ed
SHA1c0950ed8fcf05fec8dc9d82430bf8362868d49d3
SHA256bd0869ad342f66aaa662d47013c80351546f89ac243c021eb358a07fe7628769
SHA51280622f0ad4d9114b10b22d49d645e71c00f5ac1e40d05e758bf08bba1d691170dac30c07811f55b7d1c088a44b143b24a8e8ff973853399c334d3853663052ac
-
Filesize
4.0MB
MD5d5f474152567f74e982ba7462fec87ed
SHA1c0950ed8fcf05fec8dc9d82430bf8362868d49d3
SHA256bd0869ad342f66aaa662d47013c80351546f89ac243c021eb358a07fe7628769
SHA51280622f0ad4d9114b10b22d49d645e71c00f5ac1e40d05e758bf08bba1d691170dac30c07811f55b7d1c088a44b143b24a8e8ff973853399c334d3853663052ac
-
Filesize
3.3MB
MD575af9f2eb945f6f1a1517e8806102d15
SHA15148e7b2da2231498a1ba67ed73f9f8d71d40066
SHA256bb08e426c08f7f5b36e2714aeb5607fe457cc2fa824024ff470662c715021c55
SHA51206034a5ba61699d6c10f84cb89ac0541206918fba133917bf1d7cf98c48ab3f1267353297d19ed4ec341af7a4e752121cfa43cdad0d7c951d0cb145bf45c4020
-
Filesize
3.3MB
MD575af9f2eb945f6f1a1517e8806102d15
SHA15148e7b2da2231498a1ba67ed73f9f8d71d40066
SHA256bb08e426c08f7f5b36e2714aeb5607fe457cc2fa824024ff470662c715021c55
SHA51206034a5ba61699d6c10f84cb89ac0541206918fba133917bf1d7cf98c48ab3f1267353297d19ed4ec341af7a4e752121cfa43cdad0d7c951d0cb145bf45c4020
-
C:\Users\Admin\AppData\Local\Temp\._cache_bd0869ad342f66aaa662d47013c80351546f89ac243c021eb358a07fe7628769.exe
Filesize3.3MB
MD575af9f2eb945f6f1a1517e8806102d15
SHA15148e7b2da2231498a1ba67ed73f9f8d71d40066
SHA256bb08e426c08f7f5b36e2714aeb5607fe457cc2fa824024ff470662c715021c55
SHA51206034a5ba61699d6c10f84cb89ac0541206918fba133917bf1d7cf98c48ab3f1267353297d19ed4ec341af7a4e752121cfa43cdad0d7c951d0cb145bf45c4020
-
C:\Users\Admin\AppData\Local\Temp\._cache_bd0869ad342f66aaa662d47013c80351546f89ac243c021eb358a07fe7628769.exe
Filesize3.3MB
MD575af9f2eb945f6f1a1517e8806102d15
SHA15148e7b2da2231498a1ba67ed73f9f8d71d40066
SHA256bb08e426c08f7f5b36e2714aeb5607fe457cc2fa824024ff470662c715021c55
SHA51206034a5ba61699d6c10f84cb89ac0541206918fba133917bf1d7cf98c48ab3f1267353297d19ed4ec341af7a4e752121cfa43cdad0d7c951d0cb145bf45c4020
-
C:\Users\Admin\AppData\Local\Temp\._cache_bd0869ad342f66aaa662d47013c80351546f89ac243c021eb358a07fe7628769.exe
Filesize3.3MB
MD575af9f2eb945f6f1a1517e8806102d15
SHA15148e7b2da2231498a1ba67ed73f9f8d71d40066
SHA256bb08e426c08f7f5b36e2714aeb5607fe457cc2fa824024ff470662c715021c55
SHA51206034a5ba61699d6c10f84cb89ac0541206918fba133917bf1d7cf98c48ab3f1267353297d19ed4ec341af7a4e752121cfa43cdad0d7c951d0cb145bf45c4020