Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
25/08/2023, 09:56
Static task
static1
Behavioral task
behavioral1
Sample
b19dbf5dfb65ec5d211a7c18a47f2d0a5127009ecda9058a6b95fc95cb7f6ac2.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
b19dbf5dfb65ec5d211a7c18a47f2d0a5127009ecda9058a6b95fc95cb7f6ac2.exe
Resource
win10v2004-20230703-en
General
-
Target
b19dbf5dfb65ec5d211a7c18a47f2d0a5127009ecda9058a6b95fc95cb7f6ac2.exe
-
Size
437KB
-
MD5
859773f013b331c33b9912518f177881
-
SHA1
ae6a2f08b46095a9425c0bce997938d2c6a1f6b8
-
SHA256
b19dbf5dfb65ec5d211a7c18a47f2d0a5127009ecda9058a6b95fc95cb7f6ac2
-
SHA512
955b49828419ec5e3e3520c18ec4d73bc720728aeea358bf591cdb1a0d2cf0a57332aa7e43b75a3a8d85cbd9b17e9e66cf46123971b61e039ed359c56d8a83f7
-
SSDEEP
3072:7GOX9U0i7k1KdDnPQ5CXjDCofsmos5QvYx4Ove9wm+JuoY46js09/JCly6FfEVpE:iGXiQ0dDnI5CXHCofR536DXohM6lyIo
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\Local Settings b19dbf5dfb65ec5d211a7c18a47f2d0a5127009ecda9058a6b95fc95cb7f6ac2.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4260 WINWORD.EXE 4260 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 4260 WINWORD.EXE 4260 WINWORD.EXE 4260 WINWORD.EXE 4260 WINWORD.EXE 4260 WINWORD.EXE 4260 WINWORD.EXE 4260 WINWORD.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4052 wrote to memory of 4260 4052 b19dbf5dfb65ec5d211a7c18a47f2d0a5127009ecda9058a6b95fc95cb7f6ac2.exe 87 PID 4052 wrote to memory of 4260 4052 b19dbf5dfb65ec5d211a7c18a47f2d0a5127009ecda9058a6b95fc95cb7f6ac2.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\b19dbf5dfb65ec5d211a7c18a47f2d0a5127009ecda9058a6b95fc95cb7f6ac2.exe"C:\Users\Admin\AppData\Local\Temp\b19dbf5dfb65ec5d211a7c18a47f2d0a5127009ecda9058a6b95fc95cb7f6ac2.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\JobDetail.docx" /o ""2⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4260
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
227B
MD51d9537de62b62ba338f272e1a5f9435c
SHA12616f2d0e0b9f295068473cccd0671fde1064a5c
SHA256130a8175864385d8b042a1c46fff26f0e5ddbcd7fa346e0686ba5a2bfd561073
SHA512b0d70b1a0fb9c5daa22b0a8a842e193df39ef45d02f6fc86fb66c678b3e411b1cd02f4ebdcfe2399b414cda9e7908bd2703efc7237bcabe15fc4fe7e5ecd8996
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD52242522e7949cf80c07d3162adecb422
SHA1e74fb659c0b2ca8b840bdfeac81e7d5a968ca0fa
SHA25698a94417eca1ef2b8a4cbf06f8849017c93e40a503acc3e3ee1594e1ce97ff91
SHA512c3769b21a3b699fdc828d38aa8c4de06f1449fc9434e2aaf0e49a83e7258d58b9b9b621fb38db0f1e6bd145e0c4271c0cdfb14f9adcac253fed823509ae862ba
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD5128e40af9678f9e2a8f25f2be0ae45b5
SHA18b3c9ddd06432abd2811b99778e28cd3f4a26d5e
SHA25648f479421769344f442d19a1a4496e40aefbb0bb2b5850474d10358b48ebc40d
SHA512d84b6a59e27be1eaeb618a24ef41972a868c4ba9712fd9b79c393e9dd705dae39239dadede1c84237bcfcdcc6017ec8ec96f715c3fe9fead5a8b3d35084f8cf6