Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
26/08/2023, 17:41
Static task
static1
Behavioral task
behavioral1
Sample
f052b51147ff8036ce17a162f75cb6afd6a9b9b146de969018e8d41964e119df.exe
Resource
win10v2004-20230703-en
General
-
Target
f052b51147ff8036ce17a162f75cb6afd6a9b9b146de969018e8d41964e119df.exe
-
Size
2.3MB
-
MD5
f13f49d16818e8a16dc7ac29f1d5cab6
-
SHA1
5b1c266116739b74da85c115bab04a7d1479baf1
-
SHA256
f052b51147ff8036ce17a162f75cb6afd6a9b9b146de969018e8d41964e119df
-
SHA512
2de96a95260f18f24996eb69df8e30e4f42e915d07afcedf78082e011009752cbba62c6064fb6d41ce58447c4629d9ca3f16fe1d5787478facccf8214a50f356
-
SSDEEP
49152:8cbi6FGj5VZXY7sibPkAwmQCPiE4AZE1TV+0mX4:8cb6xoY+cfbELE/hC4
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 3096 rundll32.exe 1744 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000_Classes\Local Settings f052b51147ff8036ce17a162f75cb6afd6a9b9b146de969018e8d41964e119df.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3868 wrote to memory of 4568 3868 f052b51147ff8036ce17a162f75cb6afd6a9b9b146de969018e8d41964e119df.exe 81 PID 3868 wrote to memory of 4568 3868 f052b51147ff8036ce17a162f75cb6afd6a9b9b146de969018e8d41964e119df.exe 81 PID 3868 wrote to memory of 4568 3868 f052b51147ff8036ce17a162f75cb6afd6a9b9b146de969018e8d41964e119df.exe 81 PID 4568 wrote to memory of 3096 4568 control.exe 83 PID 4568 wrote to memory of 3096 4568 control.exe 83 PID 4568 wrote to memory of 3096 4568 control.exe 83 PID 3096 wrote to memory of 952 3096 rundll32.exe 86 PID 3096 wrote to memory of 952 3096 rundll32.exe 86 PID 952 wrote to memory of 1744 952 RunDll32.exe 87 PID 952 wrote to memory of 1744 952 RunDll32.exe 87 PID 952 wrote to memory of 1744 952 RunDll32.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\f052b51147ff8036ce17a162f75cb6afd6a9b9b146de969018e8d41964e119df.exe"C:\Users\Admin\AppData\Local\Temp\f052b51147ff8036ce17a162f75cb6afd6a9b9b146de969018e8d41964e119df.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3868 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\XPAI8D6E.cPl",2⤵
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\XPAI8D6E.cPl",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\XPAI8D6E.cPl",4⤵
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\XPAI8D6E.cPl",5⤵
- Loads dropped DLL
PID:1744
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.3MB
MD58de82f199bdf0573f4e661a83e15cc02
SHA1d717482e1ab432be459d005b12890b927125d91f
SHA256d1808aac8cdd7edd4c0df8029509ad3e89f376b6fb9ca7a3b7ce6bb90dcd6e0b
SHA51248ce3199d7f71e8e56ab8965da721a4b29e7108057a898a86b44f4521f44b465be687a2d0c38a8b1eea7c225f86f464750692d8f1cc2bee3dd9f5d09cf3b0fd3
-
Filesize
2.3MB
MD58de82f199bdf0573f4e661a83e15cc02
SHA1d717482e1ab432be459d005b12890b927125d91f
SHA256d1808aac8cdd7edd4c0df8029509ad3e89f376b6fb9ca7a3b7ce6bb90dcd6e0b
SHA51248ce3199d7f71e8e56ab8965da721a4b29e7108057a898a86b44f4521f44b465be687a2d0c38a8b1eea7c225f86f464750692d8f1cc2bee3dd9f5d09cf3b0fd3
-
Filesize
2.3MB
MD58de82f199bdf0573f4e661a83e15cc02
SHA1d717482e1ab432be459d005b12890b927125d91f
SHA256d1808aac8cdd7edd4c0df8029509ad3e89f376b6fb9ca7a3b7ce6bb90dcd6e0b
SHA51248ce3199d7f71e8e56ab8965da721a4b29e7108057a898a86b44f4521f44b465be687a2d0c38a8b1eea7c225f86f464750692d8f1cc2bee3dd9f5d09cf3b0fd3
-
Filesize
2.3MB
MD58de82f199bdf0573f4e661a83e15cc02
SHA1d717482e1ab432be459d005b12890b927125d91f
SHA256d1808aac8cdd7edd4c0df8029509ad3e89f376b6fb9ca7a3b7ce6bb90dcd6e0b
SHA51248ce3199d7f71e8e56ab8965da721a4b29e7108057a898a86b44f4521f44b465be687a2d0c38a8b1eea7c225f86f464750692d8f1cc2bee3dd9f5d09cf3b0fd3