Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
06/08/2023, 03:05
Static task
static1
Behavioral task
behavioral1
Sample
82739be1d5a824ee643ac4cdde4229c9071cbec590e8375f6e4a1b85fadb98d6.exe
Resource
win10v2004-20230703-en
General
-
Target
82739be1d5a824ee643ac4cdde4229c9071cbec590e8375f6e4a1b85fadb98d6.exe
-
Size
3.1MB
-
MD5
43eb363b6534a333800033f8eb4fc69c
-
SHA1
5f6a7d521fe4f385bec4072e2fdc877ae7b25f5d
-
SHA256
82739be1d5a824ee643ac4cdde4229c9071cbec590e8375f6e4a1b85fadb98d6
-
SHA512
27f3c8f84fdf0c2025bb87cbad60e6ba2ff53829942d874fad58e1c05843c44a567c2f2c34e24544dd45e4b728856bfc99a98f0df0dbe691a618dbf8484e572f
-
SSDEEP
98304:2WhlrBfKELjhBz7DrmXfNHKzkkoCaf3Ic6av61i7ueavgu:QUhdDyhKeCfiieav/
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 2824 rundll32.exe 1972 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\Local Settings 82739be1d5a824ee643ac4cdde4229c9071cbec590e8375f6e4a1b85fadb98d6.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3968 wrote to memory of 3888 3968 82739be1d5a824ee643ac4cdde4229c9071cbec590e8375f6e4a1b85fadb98d6.exe 82 PID 3968 wrote to memory of 3888 3968 82739be1d5a824ee643ac4cdde4229c9071cbec590e8375f6e4a1b85fadb98d6.exe 82 PID 3968 wrote to memory of 3888 3968 82739be1d5a824ee643ac4cdde4229c9071cbec590e8375f6e4a1b85fadb98d6.exe 82 PID 3888 wrote to memory of 2824 3888 control.exe 84 PID 3888 wrote to memory of 2824 3888 control.exe 84 PID 3888 wrote to memory of 2824 3888 control.exe 84 PID 2824 wrote to memory of 2636 2824 rundll32.exe 92 PID 2824 wrote to memory of 2636 2824 rundll32.exe 92 PID 2636 wrote to memory of 1972 2636 RunDll32.exe 93 PID 2636 wrote to memory of 1972 2636 RunDll32.exe 93 PID 2636 wrote to memory of 1972 2636 RunDll32.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\82739be1d5a824ee643ac4cdde4229c9071cbec590e8375f6e4a1b85fadb98d6.exe"C:\Users\Admin\AppData\Local\Temp\82739be1d5a824ee643ac4cdde4229c9071cbec590e8375f6e4a1b85fadb98d6.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\9xBBDBoL.CPl",2⤵
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\9xBBDBoL.CPl",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\9xBBDBoL.CPl",4⤵
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\9xBBDBoL.CPl",5⤵
- Loads dropped DLL
PID:1972
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.4MB
MD594836fabe87b0ffee9b1d332b7196d1f
SHA1d96e87b99288e5ed9e8beca7a8168584fcabcde0
SHA2565b7271dfe3395d2c6b921f99b6580d1293e57da3eda68030809143d51dc0c2cd
SHA512ce599ce0cae114fc7ca953cb76e8b94f78e98e2dd6a7e8aab3f5c6949761a00149f5faf0065aa3ed6da9e0b42f15d552bfae3e06c8585107f7cc7e1f22e369fa
-
Filesize
2.4MB
MD594836fabe87b0ffee9b1d332b7196d1f
SHA1d96e87b99288e5ed9e8beca7a8168584fcabcde0
SHA2565b7271dfe3395d2c6b921f99b6580d1293e57da3eda68030809143d51dc0c2cd
SHA512ce599ce0cae114fc7ca953cb76e8b94f78e98e2dd6a7e8aab3f5c6949761a00149f5faf0065aa3ed6da9e0b42f15d552bfae3e06c8585107f7cc7e1f22e369fa
-
Filesize
2.4MB
MD594836fabe87b0ffee9b1d332b7196d1f
SHA1d96e87b99288e5ed9e8beca7a8168584fcabcde0
SHA2565b7271dfe3395d2c6b921f99b6580d1293e57da3eda68030809143d51dc0c2cd
SHA512ce599ce0cae114fc7ca953cb76e8b94f78e98e2dd6a7e8aab3f5c6949761a00149f5faf0065aa3ed6da9e0b42f15d552bfae3e06c8585107f7cc7e1f22e369fa
-
Filesize
2.4MB
MD594836fabe87b0ffee9b1d332b7196d1f
SHA1d96e87b99288e5ed9e8beca7a8168584fcabcde0
SHA2565b7271dfe3395d2c6b921f99b6580d1293e57da3eda68030809143d51dc0c2cd
SHA512ce599ce0cae114fc7ca953cb76e8b94f78e98e2dd6a7e8aab3f5c6949761a00149f5faf0065aa3ed6da9e0b42f15d552bfae3e06c8585107f7cc7e1f22e369fa