Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
112s -
max time network
116s -
platform
windows10-1703_x64 -
resource
win10-20230915-en -
resource tags
arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system -
submitted
21/09/2023, 21:52
Static task
static1
Behavioral task
behavioral1
Sample
ee2d8f61e701ef0458c6663877685650fdc92055ebe3d557621ef208a508aa09.exe
Resource
win10-20230915-en
General
-
Target
ee2d8f61e701ef0458c6663877685650fdc92055ebe3d557621ef208a508aa09.exe
-
Size
1.0MB
-
MD5
4a00ffa42e22decebc7e533f36a09197
-
SHA1
c63955d7d76df2101eb9f1930f268fe3fc636e44
-
SHA256
ee2d8f61e701ef0458c6663877685650fdc92055ebe3d557621ef208a508aa09
-
SHA512
9af38d0924ac8f78872e21e52938c4935e00f54f3933d03290c3aea3b73413ba5c542273594300839d8f78a99c1115e17e78cd6944c468949a0f257fc8b7d8f4
-
SSDEEP
24576:RyPPx9gnWW1tKOxV6qWdwwubQYWsRAWeTTZg:EuWWLb6qWdwHUYTRiF
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 4200 x7062086.exe 1936 x9902363.exe 3600 x9132304.exe 3592 g1255561.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x9132304.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ee2d8f61e701ef0458c6663877685650fdc92055ebe3d557621ef208a508aa09.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x7062086.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x9902363.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3592 set thread context of 2220 3592 g1255561.exe 75 -
Program crash 2 IoCs
pid pid_target Process procid_target 2444 3592 WerFault.exe 73 1356 2220 WerFault.exe 75 -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 564 wrote to memory of 4200 564 ee2d8f61e701ef0458c6663877685650fdc92055ebe3d557621ef208a508aa09.exe 70 PID 564 wrote to memory of 4200 564 ee2d8f61e701ef0458c6663877685650fdc92055ebe3d557621ef208a508aa09.exe 70 PID 564 wrote to memory of 4200 564 ee2d8f61e701ef0458c6663877685650fdc92055ebe3d557621ef208a508aa09.exe 70 PID 4200 wrote to memory of 1936 4200 x7062086.exe 71 PID 4200 wrote to memory of 1936 4200 x7062086.exe 71 PID 4200 wrote to memory of 1936 4200 x7062086.exe 71 PID 1936 wrote to memory of 3600 1936 x9902363.exe 72 PID 1936 wrote to memory of 3600 1936 x9902363.exe 72 PID 1936 wrote to memory of 3600 1936 x9902363.exe 72 PID 3600 wrote to memory of 3592 3600 x9132304.exe 73 PID 3600 wrote to memory of 3592 3600 x9132304.exe 73 PID 3600 wrote to memory of 3592 3600 x9132304.exe 73 PID 3592 wrote to memory of 2220 3592 g1255561.exe 75 PID 3592 wrote to memory of 2220 3592 g1255561.exe 75 PID 3592 wrote to memory of 2220 3592 g1255561.exe 75 PID 3592 wrote to memory of 2220 3592 g1255561.exe 75 PID 3592 wrote to memory of 2220 3592 g1255561.exe 75 PID 3592 wrote to memory of 2220 3592 g1255561.exe 75 PID 3592 wrote to memory of 2220 3592 g1255561.exe 75 PID 3592 wrote to memory of 2220 3592 g1255561.exe 75 PID 3592 wrote to memory of 2220 3592 g1255561.exe 75 PID 3592 wrote to memory of 2220 3592 g1255561.exe 75
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee2d8f61e701ef0458c6663877685650fdc92055ebe3d557621ef208a508aa09.exe"C:\Users\Admin\AppData\Local\Temp\ee2d8f61e701ef0458c6663877685650fdc92055ebe3d557621ef208a508aa09.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:564 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7062086.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7062086.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4200 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x9902363.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x9902363.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9132304.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9132304.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g1255561.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g1255561.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:2220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2220 -s 5687⤵
- Program crash
PID:1356
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3592 -s 1446⤵
- Program crash
PID:2444
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
933KB
MD551a671ef44e00ec55126810affcd3c72
SHA1d9cb23137cc03be7e4a4cc56c7511d07572868e3
SHA256c7350d4f9bc28a94421217ea04970753168979167a4ca55e7bdaf369306c0828
SHA512c0450cf747e8a2ca1757cbcc095556348625137165b28673361c64a5dfda6d3232bafbc1369cb06d5a9e17d80f972a203f8dacd9e270c9a58768fa9612dfcab8
-
Filesize
933KB
MD551a671ef44e00ec55126810affcd3c72
SHA1d9cb23137cc03be7e4a4cc56c7511d07572868e3
SHA256c7350d4f9bc28a94421217ea04970753168979167a4ca55e7bdaf369306c0828
SHA512c0450cf747e8a2ca1757cbcc095556348625137165b28673361c64a5dfda6d3232bafbc1369cb06d5a9e17d80f972a203f8dacd9e270c9a58768fa9612dfcab8
-
Filesize
628KB
MD580ed4843f83131198150250d91815d9e
SHA125dde2d7c62eae9a0867bec1c46cac206cfa31e5
SHA25693cecf000d959f110b6330bdf8864fa479e5f767aadc85fac1bdc6ed26db155c
SHA5127267b6243ad92c910703feab3b363843709f490f7732411576130eef42a2cbebcc533be02896c081e89b2b24486d42ea8fa993d5cd100618052d86c8505f90fb
-
Filesize
628KB
MD580ed4843f83131198150250d91815d9e
SHA125dde2d7c62eae9a0867bec1c46cac206cfa31e5
SHA25693cecf000d959f110b6330bdf8864fa479e5f767aadc85fac1bdc6ed26db155c
SHA5127267b6243ad92c910703feab3b363843709f490f7732411576130eef42a2cbebcc533be02896c081e89b2b24486d42ea8fa993d5cd100618052d86c8505f90fb
-
Filesize
443KB
MD53812d9046b92405ed21ff8c36f3d92b1
SHA14ed9b2fabc0ef9857495e38c97bbb01dc2307dcb
SHA256647cf190da849d24f2f7bdf0ca9b6ace22c9c1dca80fef959561da5a148ce505
SHA5122a737006f65de847018b8020cebb2b78cb3e30451c84c0e2c6408a1529b32fc704f1968dd6e2f14eceedf380b7528aa476f057f16f20cc7eab94d5654a7f8de8
-
Filesize
443KB
MD53812d9046b92405ed21ff8c36f3d92b1
SHA14ed9b2fabc0ef9857495e38c97bbb01dc2307dcb
SHA256647cf190da849d24f2f7bdf0ca9b6ace22c9c1dca80fef959561da5a148ce505
SHA5122a737006f65de847018b8020cebb2b78cb3e30451c84c0e2c6408a1529b32fc704f1968dd6e2f14eceedf380b7528aa476f057f16f20cc7eab94d5654a7f8de8
-
Filesize
700KB
MD5d4d2484c1fae07f3bd370ad5d971fb5c
SHA1e7cda1d5a6b5c657209e2d88acd11e37443c11bb
SHA25669d08aa5604d889e8026ba499faabc21bde5db53707d92a53679420e33982867
SHA5129af0a5ccf3d4d8e7aa496c63a8af77072fe38e0ee7082ea1b4d6ad3c1ffb4337620031033b3d9cee73fa763c6c44207f7b6f6133f96c70fae9535b79b53167c1
-
Filesize
700KB
MD5d4d2484c1fae07f3bd370ad5d971fb5c
SHA1e7cda1d5a6b5c657209e2d88acd11e37443c11bb
SHA25669d08aa5604d889e8026ba499faabc21bde5db53707d92a53679420e33982867
SHA5129af0a5ccf3d4d8e7aa496c63a8af77072fe38e0ee7082ea1b4d6ad3c1ffb4337620031033b3d9cee73fa763c6c44207f7b6f6133f96c70fae9535b79b53167c1