Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2023, 18:03
Static task
static1
Behavioral task
behavioral1
Sample
06120b3bd5690fced06d2db5287001cf6044b97380d08548c60085206f131054.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
06120b3bd5690fced06d2db5287001cf6044b97380d08548c60085206f131054.exe
Resource
win10v2004-20230703-en
General
-
Target
06120b3bd5690fced06d2db5287001cf6044b97380d08548c60085206f131054.exe
-
Size
508KB
-
MD5
5541f014b5c1dc06d22551e57d20138d
-
SHA1
b6f8ebf036b5db686bb09cbd827cdcfb12347242
-
SHA256
06120b3bd5690fced06d2db5287001cf6044b97380d08548c60085206f131054
-
SHA512
20b24fe4fc2a0fa0b9a27d51dcf878944d1615bdb21691626dd60bbf7c0338936440f48cd7bf65eb66f8d0ee2e8145f22574a6a05bda0bd03b7bb4c71b0bb592
-
SSDEEP
6144:yW0J07EHxsWKKCbrZXDbI33z5P/kjguInr39tAOLPvI1ILz:54CWKKCrZTGF/k8uMxtxPvvz
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\tkjsidfsd 06120b3bd5690fced06d2db5287001cf6044b97380d08548c60085206f131054.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2848 06120b3bd5690fced06d2db5287001cf6044b97380d08548c60085206f131054.exe 2848 06120b3bd5690fced06d2db5287001cf6044b97380d08548c60085206f131054.exe 2848 06120b3bd5690fced06d2db5287001cf6044b97380d08548c60085206f131054.exe 2848 06120b3bd5690fced06d2db5287001cf6044b97380d08548c60085206f131054.exe 2848 06120b3bd5690fced06d2db5287001cf6044b97380d08548c60085206f131054.exe 2848 06120b3bd5690fced06d2db5287001cf6044b97380d08548c60085206f131054.exe 2848 06120b3bd5690fced06d2db5287001cf6044b97380d08548c60085206f131054.exe 2848 06120b3bd5690fced06d2db5287001cf6044b97380d08548c60085206f131054.exe 2848 06120b3bd5690fced06d2db5287001cf6044b97380d08548c60085206f131054.exe 2848 06120b3bd5690fced06d2db5287001cf6044b97380d08548c60085206f131054.exe 2848 06120b3bd5690fced06d2db5287001cf6044b97380d08548c60085206f131054.exe 2848 06120b3bd5690fced06d2db5287001cf6044b97380d08548c60085206f131054.exe 2848 06120b3bd5690fced06d2db5287001cf6044b97380d08548c60085206f131054.exe 2848 06120b3bd5690fced06d2db5287001cf6044b97380d08548c60085206f131054.exe 2848 06120b3bd5690fced06d2db5287001cf6044b97380d08548c60085206f131054.exe 2848 06120b3bd5690fced06d2db5287001cf6044b97380d08548c60085206f131054.exe 2848 06120b3bd5690fced06d2db5287001cf6044b97380d08548c60085206f131054.exe 2848 06120b3bd5690fced06d2db5287001cf6044b97380d08548c60085206f131054.exe 2848 06120b3bd5690fced06d2db5287001cf6044b97380d08548c60085206f131054.exe 2848 06120b3bd5690fced06d2db5287001cf6044b97380d08548c60085206f131054.exe 2848 06120b3bd5690fced06d2db5287001cf6044b97380d08548c60085206f131054.exe 2848 06120b3bd5690fced06d2db5287001cf6044b97380d08548c60085206f131054.exe 2848 06120b3bd5690fced06d2db5287001cf6044b97380d08548c60085206f131054.exe 2848 06120b3bd5690fced06d2db5287001cf6044b97380d08548c60085206f131054.exe 2848 06120b3bd5690fced06d2db5287001cf6044b97380d08548c60085206f131054.exe 2848 06120b3bd5690fced06d2db5287001cf6044b97380d08548c60085206f131054.exe 2848 06120b3bd5690fced06d2db5287001cf6044b97380d08548c60085206f131054.exe 2848 06120b3bd5690fced06d2db5287001cf6044b97380d08548c60085206f131054.exe 2848 06120b3bd5690fced06d2db5287001cf6044b97380d08548c60085206f131054.exe 2848 06120b3bd5690fced06d2db5287001cf6044b97380d08548c60085206f131054.exe 2848 06120b3bd5690fced06d2db5287001cf6044b97380d08548c60085206f131054.exe 2848 06120b3bd5690fced06d2db5287001cf6044b97380d08548c60085206f131054.exe 2848 06120b3bd5690fced06d2db5287001cf6044b97380d08548c60085206f131054.exe 2848 06120b3bd5690fced06d2db5287001cf6044b97380d08548c60085206f131054.exe 2848 06120b3bd5690fced06d2db5287001cf6044b97380d08548c60085206f131054.exe 2848 06120b3bd5690fced06d2db5287001cf6044b97380d08548c60085206f131054.exe 2848 06120b3bd5690fced06d2db5287001cf6044b97380d08548c60085206f131054.exe 2848 06120b3bd5690fced06d2db5287001cf6044b97380d08548c60085206f131054.exe 2848 06120b3bd5690fced06d2db5287001cf6044b97380d08548c60085206f131054.exe 2848 06120b3bd5690fced06d2db5287001cf6044b97380d08548c60085206f131054.exe 2848 06120b3bd5690fced06d2db5287001cf6044b97380d08548c60085206f131054.exe 2848 06120b3bd5690fced06d2db5287001cf6044b97380d08548c60085206f131054.exe 2848 06120b3bd5690fced06d2db5287001cf6044b97380d08548c60085206f131054.exe 2848 06120b3bd5690fced06d2db5287001cf6044b97380d08548c60085206f131054.exe 2848 06120b3bd5690fced06d2db5287001cf6044b97380d08548c60085206f131054.exe 2848 06120b3bd5690fced06d2db5287001cf6044b97380d08548c60085206f131054.exe 2848 06120b3bd5690fced06d2db5287001cf6044b97380d08548c60085206f131054.exe 2848 06120b3bd5690fced06d2db5287001cf6044b97380d08548c60085206f131054.exe 2848 06120b3bd5690fced06d2db5287001cf6044b97380d08548c60085206f131054.exe 2848 06120b3bd5690fced06d2db5287001cf6044b97380d08548c60085206f131054.exe 2848 06120b3bd5690fced06d2db5287001cf6044b97380d08548c60085206f131054.exe 2848 06120b3bd5690fced06d2db5287001cf6044b97380d08548c60085206f131054.exe 2848 06120b3bd5690fced06d2db5287001cf6044b97380d08548c60085206f131054.exe 2848 06120b3bd5690fced06d2db5287001cf6044b97380d08548c60085206f131054.exe 2848 06120b3bd5690fced06d2db5287001cf6044b97380d08548c60085206f131054.exe 2848 06120b3bd5690fced06d2db5287001cf6044b97380d08548c60085206f131054.exe 2848 06120b3bd5690fced06d2db5287001cf6044b97380d08548c60085206f131054.exe 2848 06120b3bd5690fced06d2db5287001cf6044b97380d08548c60085206f131054.exe 2848 06120b3bd5690fced06d2db5287001cf6044b97380d08548c60085206f131054.exe 2848 06120b3bd5690fced06d2db5287001cf6044b97380d08548c60085206f131054.exe 2848 06120b3bd5690fced06d2db5287001cf6044b97380d08548c60085206f131054.exe 2848 06120b3bd5690fced06d2db5287001cf6044b97380d08548c60085206f131054.exe 2848 06120b3bd5690fced06d2db5287001cf6044b97380d08548c60085206f131054.exe 2848 06120b3bd5690fced06d2db5287001cf6044b97380d08548c60085206f131054.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2848 wrote to memory of 4240 2848 06120b3bd5690fced06d2db5287001cf6044b97380d08548c60085206f131054.exe 90 PID 2848 wrote to memory of 4240 2848 06120b3bd5690fced06d2db5287001cf6044b97380d08548c60085206f131054.exe 90 PID 2848 wrote to memory of 4240 2848 06120b3bd5690fced06d2db5287001cf6044b97380d08548c60085206f131054.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\06120b3bd5690fced06d2db5287001cf6044b97380d08548c60085206f131054.exe"C:\Users\Admin\AppData\Local\Temp\06120b3bd5690fced06d2db5287001cf6044b97380d08548c60085206f131054.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c del "C:\Users\Admin\AppData\Local\Temp\06120b3bd5690fced06d2db5287001cf6044b97380d08548c60085206f131054.exe"2⤵PID:4240
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD5fa68a2c03a4982e5491bd47f2076e60a
SHA10dd382648c569c840cdabdf46e8a8639d8109ba0
SHA256cc667e37d3ba26204d5bc34f1438002c5355ea8f33fbe87fba41883320548993
SHA512e131788d6ecf68d5fcc7f4f38a13c0ff85cccd5fe5be08d7a6b7d1b6ab6240cb403f9cab1dd24703933f1d43431ad80e5d8d1192dcaa5bb7605ce104e1feb6ae
-
Filesize
93B
MD5e6ea105a47f3b6c77fb024223eeb27a2
SHA15fcac129e19f61e9187ab5d03bc0e12c79223986
SHA2561adcdd484e88ac8925f0c0e0d15aca2339be9abe18c18940377487d2608a3004
SHA51219de7c2ab4e882ec9e127fcf48d8863cb95c4f328d85fd98678710ca73ab215d242dcdee05b5a1544591bf172738c3f979c1f146355091cb6e8181727933f8ad
-
Filesize
46B
MD5fa68a2c03a4982e5491bd47f2076e60a
SHA10dd382648c569c840cdabdf46e8a8639d8109ba0
SHA256cc667e37d3ba26204d5bc34f1438002c5355ea8f33fbe87fba41883320548993
SHA512e131788d6ecf68d5fcc7f4f38a13c0ff85cccd5fe5be08d7a6b7d1b6ab6240cb403f9cab1dd24703933f1d43431ad80e5d8d1192dcaa5bb7605ce104e1feb6ae
-
Filesize
116B
MD564b8c8e66944b0c0f5ffb31f9f6d1e4d
SHA14896f1c450624208877243e6a9d9f851050ad4cb
SHA2563759ea4e3cc514fd08a50a784b656aaa4980618b93e940f09328f004ed5e4cd2
SHA512c2fb45155894ccebbe8f1972f9aa29269e93edb1974d62cbf9e24e5af219df8a41a39a15ccbbbe8810c016224bff345cce8b0c4eff77343898c0081e59c59c73