Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2023, 12:14
Static task
static1
Behavioral task
behavioral1
Sample
db5a6542fea11f3cad83a6e7219d0cc715d7d9185d77a72de5ec230effb8366a.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
db5a6542fea11f3cad83a6e7219d0cc715d7d9185d77a72de5ec230effb8366a.exe
Resource
win10v2004-20230915-en
General
-
Target
db5a6542fea11f3cad83a6e7219d0cc715d7d9185d77a72de5ec230effb8366a.exe
-
Size
84KB
-
MD5
81f240d66929ab2a29ead2549eef44b3
-
SHA1
c0880684d990c92aa391b23cb37c444aa8ff8084
-
SHA256
db5a6542fea11f3cad83a6e7219d0cc715d7d9185d77a72de5ec230effb8366a
-
SHA512
a8869dba57c7405578bfdc9dcbd72c253a8e26619e658ccb43e956741297ff43d1c82a23f7e338474b3827a4564506f6216df54883b2fde77365417f54c090ea
-
SSDEEP
1536:RshfSWHHNvoLqNwDDGw02eQmh0HjWOSNnaoao7NQ:GhfxHNIreQm+HiBNnaoao7NQ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4244 rundll32.exe -
Modifies system executable filetype association 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command db5a6542fea11f3cad83a6e7219d0cc715d7d9185d77a72de5ec230effb8366a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" db5a6542fea11f3cad83a6e7219d0cc715d7d9185d77a72de5ec230effb8366a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" db5a6542fea11f3cad83a6e7219d0cc715d7d9185d77a72de5ec230effb8366a.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\¢«.exe db5a6542fea11f3cad83a6e7219d0cc715d7d9185d77a72de5ec230effb8366a.exe File created C:\Windows\SysWOW64\¢«.exe db5a6542fea11f3cad83a6e7219d0cc715d7d9185d77a72de5ec230effb8366a.exe File opened for modification C:\Windows\SysWOW64\notepad¢¬.exe db5a6542fea11f3cad83a6e7219d0cc715d7d9185d77a72de5ec230effb8366a.exe File created C:\Windows\SysWOW64\notepad¢¬.exe db5a6542fea11f3cad83a6e7219d0cc715d7d9185d77a72de5ec230effb8366a.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system\rundll32.exe db5a6542fea11f3cad83a6e7219d0cc715d7d9185d77a72de5ec230effb8366a.exe File created C:\Windows\system\rundll32.exe db5a6542fea11f3cad83a6e7219d0cc715d7d9185d77a72de5ec230effb8366a.exe -
Modifies registry class 15 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" db5a6542fea11f3cad83a6e7219d0cc715d7d9185d77a72de5ec230effb8366a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainSetup = "1695125682" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainUp = "1695125682" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command db5a6542fea11f3cad83a6e7219d0cc715d7d9185d77a72de5ec230effb8366a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" db5a6542fea11f3cad83a6e7219d0cc715d7d9185d77a72de5ec230effb8366a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" db5a6542fea11f3cad83a6e7219d0cc715d7d9185d77a72de5ec230effb8366a.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv db5a6542fea11f3cad83a6e7219d0cc715d7d9185d77a72de5ec230effb8366a.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command db5a6542fea11f3cad83a6e7219d0cc715d7d9185d77a72de5ec230effb8366a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad.exe %1" db5a6542fea11f3cad83a6e7219d0cc715d7d9185d77a72de5ec230effb8366a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainVer = "506" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 3360 db5a6542fea11f3cad83a6e7219d0cc715d7d9185d77a72de5ec230effb8366a.exe 3360 db5a6542fea11f3cad83a6e7219d0cc715d7d9185d77a72de5ec230effb8366a.exe 3360 db5a6542fea11f3cad83a6e7219d0cc715d7d9185d77a72de5ec230effb8366a.exe 3360 db5a6542fea11f3cad83a6e7219d0cc715d7d9185d77a72de5ec230effb8366a.exe 3360 db5a6542fea11f3cad83a6e7219d0cc715d7d9185d77a72de5ec230effb8366a.exe 3360 db5a6542fea11f3cad83a6e7219d0cc715d7d9185d77a72de5ec230effb8366a.exe 3360 db5a6542fea11f3cad83a6e7219d0cc715d7d9185d77a72de5ec230effb8366a.exe 3360 db5a6542fea11f3cad83a6e7219d0cc715d7d9185d77a72de5ec230effb8366a.exe 3360 db5a6542fea11f3cad83a6e7219d0cc715d7d9185d77a72de5ec230effb8366a.exe 3360 db5a6542fea11f3cad83a6e7219d0cc715d7d9185d77a72de5ec230effb8366a.exe 3360 db5a6542fea11f3cad83a6e7219d0cc715d7d9185d77a72de5ec230effb8366a.exe 3360 db5a6542fea11f3cad83a6e7219d0cc715d7d9185d77a72de5ec230effb8366a.exe 3360 db5a6542fea11f3cad83a6e7219d0cc715d7d9185d77a72de5ec230effb8366a.exe 3360 db5a6542fea11f3cad83a6e7219d0cc715d7d9185d77a72de5ec230effb8366a.exe 3360 db5a6542fea11f3cad83a6e7219d0cc715d7d9185d77a72de5ec230effb8366a.exe 3360 db5a6542fea11f3cad83a6e7219d0cc715d7d9185d77a72de5ec230effb8366a.exe 3360 db5a6542fea11f3cad83a6e7219d0cc715d7d9185d77a72de5ec230effb8366a.exe 3360 db5a6542fea11f3cad83a6e7219d0cc715d7d9185d77a72de5ec230effb8366a.exe 3360 db5a6542fea11f3cad83a6e7219d0cc715d7d9185d77a72de5ec230effb8366a.exe 3360 db5a6542fea11f3cad83a6e7219d0cc715d7d9185d77a72de5ec230effb8366a.exe 3360 db5a6542fea11f3cad83a6e7219d0cc715d7d9185d77a72de5ec230effb8366a.exe 3360 db5a6542fea11f3cad83a6e7219d0cc715d7d9185d77a72de5ec230effb8366a.exe 3360 db5a6542fea11f3cad83a6e7219d0cc715d7d9185d77a72de5ec230effb8366a.exe 3360 db5a6542fea11f3cad83a6e7219d0cc715d7d9185d77a72de5ec230effb8366a.exe 3360 db5a6542fea11f3cad83a6e7219d0cc715d7d9185d77a72de5ec230effb8366a.exe 3360 db5a6542fea11f3cad83a6e7219d0cc715d7d9185d77a72de5ec230effb8366a.exe 3360 db5a6542fea11f3cad83a6e7219d0cc715d7d9185d77a72de5ec230effb8366a.exe 3360 db5a6542fea11f3cad83a6e7219d0cc715d7d9185d77a72de5ec230effb8366a.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4244 rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3360 db5a6542fea11f3cad83a6e7219d0cc715d7d9185d77a72de5ec230effb8366a.exe 4244 rundll32.exe 4244 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3360 wrote to memory of 4244 3360 db5a6542fea11f3cad83a6e7219d0cc715d7d9185d77a72de5ec230effb8366a.exe 87 PID 3360 wrote to memory of 4244 3360 db5a6542fea11f3cad83a6e7219d0cc715d7d9185d77a72de5ec230effb8366a.exe 87 PID 3360 wrote to memory of 4244 3360 db5a6542fea11f3cad83a6e7219d0cc715d7d9185d77a72de5ec230effb8366a.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\db5a6542fea11f3cad83a6e7219d0cc715d7d9185d77a72de5ec230effb8366a.exe"C:\Users\Admin\AppData\Local\Temp\db5a6542fea11f3cad83a6e7219d0cc715d7d9185d77a72de5ec230effb8366a.exe"1⤵
- Modifies system executable filetype association
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Windows\system\rundll32.exeC:\Windows\system\rundll32.exe2⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:4244
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5030ed2489bb9919e7d412fcbbac9ce6c
SHA1361ba0c334a33d5cb5b32f4ff636392a83e3fb49
SHA2562c451010c7101fa10b7386500959ba7486ab0a15e25158bbb2aa5e9224633a1a
SHA512edb312c5479255fdcfad8178de314491fe8dd1319c1c08b6440ef212b05e12889050130a8cc50b83808ab7187a1389b87362339d1436bb4286b06aad3211ea73
-
Filesize
85KB
MD5974fca63b3123e04f3a50c806b6946dd
SHA1228e37bbb9392d5c4e7daa6abf451d1349e1a47d
SHA256093b432b3c0e889608cfcdf085b62645f29840853fd2c2e51309c02ccfc9d482
SHA512cccb66af02f411bb0b592501989ebad11f2f9f13bec5d296f5179bff5103e2649f91d7e22a810933c9659279a0ed125efcc42cfeee887387c2f5a810f5e69a61
-
Filesize
85KB
MD5974fca63b3123e04f3a50c806b6946dd
SHA1228e37bbb9392d5c4e7daa6abf451d1349e1a47d
SHA256093b432b3c0e889608cfcdf085b62645f29840853fd2c2e51309c02ccfc9d482
SHA512cccb66af02f411bb0b592501989ebad11f2f9f13bec5d296f5179bff5103e2649f91d7e22a810933c9659279a0ed125efcc42cfeee887387c2f5a810f5e69a61