Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
27/08/2023, 08:08
Static task
static1
Behavioral task
behavioral1
Sample
672cfd7ff738e393eef880a9b878ca44d291898e93299de854e498b84b0b6fd9.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
672cfd7ff738e393eef880a9b878ca44d291898e93299de854e498b84b0b6fd9.exe
Resource
win10v2004-20230703-en
General
-
Target
672cfd7ff738e393eef880a9b878ca44d291898e93299de854e498b84b0b6fd9.exe
-
Size
676KB
-
MD5
2ab765da96e5e7d082f3cd11be081654
-
SHA1
897f7919c3577a95dbd3d7ba0633f87cdf0ba4f5
-
SHA256
672cfd7ff738e393eef880a9b878ca44d291898e93299de854e498b84b0b6fd9
-
SHA512
f892d367ed546c948001ba0a214011b13faa35b2ab11f09ae4ea02c4d0be31025201524a38ea56ab3f249a517b49edf3dffef6899bbfd33eab12aa3845dd2d03
-
SSDEEP
6144:z5+wzHywOv9sn4OwB7p+S+Wo89UNS8VuiIWUlhxcGsZ0yO1g/rTDAsldDapA3qkq:z5+wjsyn4OwF0S3ninUXgA1OrHNl0n
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 4 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: format.com File opened (read-only) \??\D: format.com File opened (read-only) \??\G: format.com File opened (read-only) \??\F: format.com -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\physicaldrive0 672cfd7ff738e393eef880a9b878ca44d291898e93299de854e498b84b0b6fd9.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2056 672cfd7ff738e393eef880a9b878ca44d291898e93299de854e498b84b0b6fd9.exe 2056 672cfd7ff738e393eef880a9b878ca44d291898e93299de854e498b84b0b6fd9.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2056 wrote to memory of 5020 2056 672cfd7ff738e393eef880a9b878ca44d291898e93299de854e498b84b0b6fd9.exe 81 PID 2056 wrote to memory of 5020 2056 672cfd7ff738e393eef880a9b878ca44d291898e93299de854e498b84b0b6fd9.exe 81 PID 2056 wrote to memory of 5020 2056 672cfd7ff738e393eef880a9b878ca44d291898e93299de854e498b84b0b6fd9.exe 81 PID 2056 wrote to memory of 3992 2056 672cfd7ff738e393eef880a9b878ca44d291898e93299de854e498b84b0b6fd9.exe 85 PID 2056 wrote to memory of 3992 2056 672cfd7ff738e393eef880a9b878ca44d291898e93299de854e498b84b0b6fd9.exe 85 PID 2056 wrote to memory of 3992 2056 672cfd7ff738e393eef880a9b878ca44d291898e93299de854e498b84b0b6fd9.exe 85 PID 2056 wrote to memory of 1036 2056 672cfd7ff738e393eef880a9b878ca44d291898e93299de854e498b84b0b6fd9.exe 82 PID 2056 wrote to memory of 1036 2056 672cfd7ff738e393eef880a9b878ca44d291898e93299de854e498b84b0b6fd9.exe 82 PID 2056 wrote to memory of 1036 2056 672cfd7ff738e393eef880a9b878ca44d291898e93299de854e498b84b0b6fd9.exe 82 PID 2056 wrote to memory of 552 2056 672cfd7ff738e393eef880a9b878ca44d291898e93299de854e498b84b0b6fd9.exe 84 PID 2056 wrote to memory of 552 2056 672cfd7ff738e393eef880a9b878ca44d291898e93299de854e498b84b0b6fd9.exe 84 PID 2056 wrote to memory of 552 2056 672cfd7ff738e393eef880a9b878ca44d291898e93299de854e498b84b0b6fd9.exe 84 PID 2056 wrote to memory of 1996 2056 672cfd7ff738e393eef880a9b878ca44d291898e93299de854e498b84b0b6fd9.exe 83 PID 2056 wrote to memory of 1996 2056 672cfd7ff738e393eef880a9b878ca44d291898e93299de854e498b84b0b6fd9.exe 83 PID 2056 wrote to memory of 1996 2056 672cfd7ff738e393eef880a9b878ca44d291898e93299de854e498b84b0b6fd9.exe 83 PID 5020 wrote to memory of 3784 5020 cmd.exe 91 PID 5020 wrote to memory of 3784 5020 cmd.exe 91 PID 5020 wrote to memory of 3784 5020 cmd.exe 91 PID 3992 wrote to memory of 4848 3992 cmd.exe 92 PID 3992 wrote to memory of 4848 3992 cmd.exe 92 PID 3992 wrote to memory of 4848 3992 cmd.exe 92 PID 1996 wrote to memory of 556 1996 cmd.exe 95 PID 1996 wrote to memory of 556 1996 cmd.exe 95 PID 1996 wrote to memory of 556 1996 cmd.exe 95 PID 552 wrote to memory of 1964 552 cmd.exe 93 PID 552 wrote to memory of 1964 552 cmd.exe 93 PID 552 wrote to memory of 1964 552 cmd.exe 93 PID 1036 wrote to memory of 4064 1036 cmd.exe 94 PID 1036 wrote to memory of 4064 1036 cmd.exe 94 PID 1036 wrote to memory of 4064 1036 cmd.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\672cfd7ff738e393eef880a9b878ca44d291898e93299de854e498b84b0b6fd9.exe"C:\Users\Admin\AppData\Local\Temp\672cfd7ff738e393eef880a9b878ca44d291898e93299de854e498b84b0b6fd9.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\SysWOW64\cmd.execmd /c format c: /q /y2⤵
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Windows\SysWOW64\format.comformat c: /q /y3⤵PID:3784
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c format e: /q /y2⤵
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Windows\SysWOW64\format.comformat e: /q /y3⤵
- Enumerates connected drives
PID:4064
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c format g: /q /y2⤵
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\SysWOW64\format.comformat g: /q /y3⤵
- Enumerates connected drives
PID:556
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c format f: /q /y2⤵
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Windows\SysWOW64\format.comformat f: /q /y3⤵
- Enumerates connected drives
PID:1964
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c format d: /q /y2⤵
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Windows\SysWOW64\format.comformat d: /q /y3⤵
- Enumerates connected drives
PID:4848
-
-