Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
27/08/2023, 13:31
Static task
static1
Behavioral task
behavioral1
Sample
8be53871f6ee10795c892f5a1274b30608e7b3e8b722bc6d88484f49cfd8f580.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
8be53871f6ee10795c892f5a1274b30608e7b3e8b722bc6d88484f49cfd8f580.exe
Resource
win10v2004-20230703-en
General
-
Target
8be53871f6ee10795c892f5a1274b30608e7b3e8b722bc6d88484f49cfd8f580.exe
-
Size
3.2MB
-
MD5
787db21989a9b6a297a53c33bd8827d4
-
SHA1
14c3a0d5fa7ebf062a729140d2f8c97e647c4ff3
-
SHA256
8be53871f6ee10795c892f5a1274b30608e7b3e8b722bc6d88484f49cfd8f580
-
SHA512
36c5105cae3c08ad044d8e8b06742a8f99b6ad24bc3b0f6f62104a771346263e95759d257525745690b203331ff278226c121a737d4348c4c986ab9a6b941d52
-
SSDEEP
49152:3BFsVkDH/AEeB4IFlBgcO8Ipc8dOjYAZ3oHrj/i6jbY:RS+DH/AEe2IFlBgcIpc8dOsI3QJj8
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3792 cmd.exe 1748 csrss.exe -
resource yara_rule behavioral2/files/0x0006000000023215-15.dat upx behavioral2/files/0x0006000000023215-17.dat upx behavioral2/memory/1748-18-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/files/0x0006000000023215-19.dat upx behavioral2/memory/1748-20-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\cmd.exe = "C:\\Windows\\cmd.exe" cmd.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\AppPatch\NetSyst81.dll csrss.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\cmd.exe 8be53871f6ee10795c892f5a1274b30608e7b3e8b722bc6d88484f49cfd8f580.exe File created C:\Windows\csrss.exe cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\Local Settings 8be53871f6ee10795c892f5a1274b30608e7b3e8b722bc6d88484f49cfd8f580.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4644 8be53871f6ee10795c892f5a1274b30608e7b3e8b722bc6d88484f49cfd8f580.exe 4644 8be53871f6ee10795c892f5a1274b30608e7b3e8b722bc6d88484f49cfd8f580.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 4644 8be53871f6ee10795c892f5a1274b30608e7b3e8b722bc6d88484f49cfd8f580.exe 4644 8be53871f6ee10795c892f5a1274b30608e7b3e8b722bc6d88484f49cfd8f580.exe 3792 cmd.exe 3792 cmd.exe 3792 cmd.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4644 wrote to memory of 3792 4644 8be53871f6ee10795c892f5a1274b30608e7b3e8b722bc6d88484f49cfd8f580.exe 83 PID 4644 wrote to memory of 3792 4644 8be53871f6ee10795c892f5a1274b30608e7b3e8b722bc6d88484f49cfd8f580.exe 83 PID 4644 wrote to memory of 3792 4644 8be53871f6ee10795c892f5a1274b30608e7b3e8b722bc6d88484f49cfd8f580.exe 83 PID 3792 wrote to memory of 1748 3792 cmd.exe 87 PID 3792 wrote to memory of 1748 3792 cmd.exe 87 PID 3792 wrote to memory of 1748 3792 cmd.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\8be53871f6ee10795c892f5a1274b30608e7b3e8b722bc6d88484f49cfd8f580.exe"C:\Users\Admin\AppData\Local\Temp\8be53871f6ee10795c892f5a1274b30608e7b3e8b722bc6d88484f49cfd8f580.exe"1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Windows\cmd.exe"C:\Windows\cmd.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3792 -
C:\Windows\csrss.exe"C:\Windows\csrss.exe"3⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:1748
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3796
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
808KB
MD5d5f5f0ebb134ca0c67ab60c659a1ae41
SHA1529dd9fbb43659279d083862c0208c7d883d72cf
SHA256598fafb86d687aafc0db520f2534fff2cc449366e0a4a5858f4fc050f4940740
SHA512439a10d432aaaf40d53ffbdf60817cacae4c3518adc7d4ad8be947f90f19c50acbf6bac5a018d063441fd79af02ddd68c65f8fc496d8a81afdd002df478cb96c
-
Filesize
808KB
MD5d5f5f0ebb134ca0c67ab60c659a1ae41
SHA1529dd9fbb43659279d083862c0208c7d883d72cf
SHA256598fafb86d687aafc0db520f2534fff2cc449366e0a4a5858f4fc050f4940740
SHA512439a10d432aaaf40d53ffbdf60817cacae4c3518adc7d4ad8be947f90f19c50acbf6bac5a018d063441fd79af02ddd68c65f8fc496d8a81afdd002df478cb96c
-
Filesize
808KB
MD5d5f5f0ebb134ca0c67ab60c659a1ae41
SHA1529dd9fbb43659279d083862c0208c7d883d72cf
SHA256598fafb86d687aafc0db520f2534fff2cc449366e0a4a5858f4fc050f4940740
SHA512439a10d432aaaf40d53ffbdf60817cacae4c3518adc7d4ad8be947f90f19c50acbf6bac5a018d063441fd79af02ddd68c65f8fc496d8a81afdd002df478cb96c
-
Filesize
6KB
MD5b58a5bc5705e66b3fdaeba17e346ffe6
SHA1b3ba09b9625096119a28ba979e1cafb7be769786
SHA25655f1c3dc84b498fc3bbf05d80e23cb168716053989f922d4dcf53c9279fc66cb
SHA5121343e67cee9cd1ad746d12d41ae1c9a3e98d19b728491c4e813e8cfa708e5978557e3f206c921955538a6af60246e6ea8b4349d5c62289442cbb61c3d255456f
-
Filesize
6KB
MD5b58a5bc5705e66b3fdaeba17e346ffe6
SHA1b3ba09b9625096119a28ba979e1cafb7be769786
SHA25655f1c3dc84b498fc3bbf05d80e23cb168716053989f922d4dcf53c9279fc66cb
SHA5121343e67cee9cd1ad746d12d41ae1c9a3e98d19b728491c4e813e8cfa708e5978557e3f206c921955538a6af60246e6ea8b4349d5c62289442cbb61c3d255456f
-
Filesize
6KB
MD5b58a5bc5705e66b3fdaeba17e346ffe6
SHA1b3ba09b9625096119a28ba979e1cafb7be769786
SHA25655f1c3dc84b498fc3bbf05d80e23cb168716053989f922d4dcf53c9279fc66cb
SHA5121343e67cee9cd1ad746d12d41ae1c9a3e98d19b728491c4e813e8cfa708e5978557e3f206c921955538a6af60246e6ea8b4349d5c62289442cbb61c3d255456f