Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
21/08/2023, 20:17
Behavioral task
behavioral1
Sample
355e4c7ba564e5f5f8c76ca1c48a4bdee58093e97b3a6946082ce6e27bf5c60d.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
355e4c7ba564e5f5f8c76ca1c48a4bdee58093e97b3a6946082ce6e27bf5c60d.exe
Resource
win10v2004-20230703-en
General
-
Target
355e4c7ba564e5f5f8c76ca1c48a4bdee58093e97b3a6946082ce6e27bf5c60d.exe
-
Size
12.8MB
-
MD5
20fd656120a1ce09a041bd9bb539a6df
-
SHA1
1ac639cd162545d2f984af61e1fb544494b34501
-
SHA256
355e4c7ba564e5f5f8c76ca1c48a4bdee58093e97b3a6946082ce6e27bf5c60d
-
SHA512
e0cc3a9e04a2e955721601e4981c106f891e335cdf361a84320844642d5b8722e8c4f8c77131f52f6889dcd66632fe8280939d9755ec89cfd87805327b6b756d
-
SSDEEP
393216:dsm+o/IsJomYVSFoYt/TzfCnGERpFtBCUq:ykdJUwfzOK5
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4344-133-0x0000000000400000-0x0000000000CC2000-memory.dmp upx behavioral2/memory/4344-140-0x0000000000400000-0x0000000000CC2000-memory.dmp upx behavioral2/memory/4344-162-0x0000000000400000-0x0000000000CC2000-memory.dmp upx -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: 355e4c7ba564e5f5f8c76ca1c48a4bdee58093e97b3a6946082ce6e27bf5c60d.exe File opened (read-only) \??\L: 355e4c7ba564e5f5f8c76ca1c48a4bdee58093e97b3a6946082ce6e27bf5c60d.exe File opened (read-only) \??\S: 355e4c7ba564e5f5f8c76ca1c48a4bdee58093e97b3a6946082ce6e27bf5c60d.exe File opened (read-only) \??\T: 355e4c7ba564e5f5f8c76ca1c48a4bdee58093e97b3a6946082ce6e27bf5c60d.exe File opened (read-only) \??\U: 355e4c7ba564e5f5f8c76ca1c48a4bdee58093e97b3a6946082ce6e27bf5c60d.exe File opened (read-only) \??\R: 355e4c7ba564e5f5f8c76ca1c48a4bdee58093e97b3a6946082ce6e27bf5c60d.exe File opened (read-only) \??\V: 355e4c7ba564e5f5f8c76ca1c48a4bdee58093e97b3a6946082ce6e27bf5c60d.exe File opened (read-only) \??\W: 355e4c7ba564e5f5f8c76ca1c48a4bdee58093e97b3a6946082ce6e27bf5c60d.exe File opened (read-only) \??\B: 355e4c7ba564e5f5f8c76ca1c48a4bdee58093e97b3a6946082ce6e27bf5c60d.exe File opened (read-only) \??\E: 355e4c7ba564e5f5f8c76ca1c48a4bdee58093e97b3a6946082ce6e27bf5c60d.exe File opened (read-only) \??\I: 355e4c7ba564e5f5f8c76ca1c48a4bdee58093e97b3a6946082ce6e27bf5c60d.exe File opened (read-only) \??\N: 355e4c7ba564e5f5f8c76ca1c48a4bdee58093e97b3a6946082ce6e27bf5c60d.exe File opened (read-only) \??\O: 355e4c7ba564e5f5f8c76ca1c48a4bdee58093e97b3a6946082ce6e27bf5c60d.exe File opened (read-only) \??\A: 355e4c7ba564e5f5f8c76ca1c48a4bdee58093e97b3a6946082ce6e27bf5c60d.exe File opened (read-only) \??\K: 355e4c7ba564e5f5f8c76ca1c48a4bdee58093e97b3a6946082ce6e27bf5c60d.exe File opened (read-only) \??\X: 355e4c7ba564e5f5f8c76ca1c48a4bdee58093e97b3a6946082ce6e27bf5c60d.exe File opened (read-only) \??\Y: 355e4c7ba564e5f5f8c76ca1c48a4bdee58093e97b3a6946082ce6e27bf5c60d.exe File opened (read-only) \??\Z: 355e4c7ba564e5f5f8c76ca1c48a4bdee58093e97b3a6946082ce6e27bf5c60d.exe File opened (read-only) \??\G: 355e4c7ba564e5f5f8c76ca1c48a4bdee58093e97b3a6946082ce6e27bf5c60d.exe File opened (read-only) \??\J: 355e4c7ba564e5f5f8c76ca1c48a4bdee58093e97b3a6946082ce6e27bf5c60d.exe File opened (read-only) \??\M: 355e4c7ba564e5f5f8c76ca1c48a4bdee58093e97b3a6946082ce6e27bf5c60d.exe File opened (read-only) \??\P: 355e4c7ba564e5f5f8c76ca1c48a4bdee58093e97b3a6946082ce6e27bf5c60d.exe File opened (read-only) \??\Q: 355e4c7ba564e5f5f8c76ca1c48a4bdee58093e97b3a6946082ce6e27bf5c60d.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4344 355e4c7ba564e5f5f8c76ca1c48a4bdee58093e97b3a6946082ce6e27bf5c60d.exe 4344 355e4c7ba564e5f5f8c76ca1c48a4bdee58093e97b3a6946082ce6e27bf5c60d.exe 4344 355e4c7ba564e5f5f8c76ca1c48a4bdee58093e97b3a6946082ce6e27bf5c60d.exe 4344 355e4c7ba564e5f5f8c76ca1c48a4bdee58093e97b3a6946082ce6e27bf5c60d.exe