Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
188s -
max time network
302s -
platform
windows10-1703_x64 -
resource
win10-20230915-en -
resource tags
arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system -
submitted
04/10/2023, 03:43
Static task
static1
Behavioral task
behavioral1
Sample
be021e088ea292b1ce720b6bdc06dfe7fa33dd4bd670a6c404dd5b0146a7c36f.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
be021e088ea292b1ce720b6bdc06dfe7fa33dd4bd670a6c404dd5b0146a7c36f.exe
Resource
win10-20230915-en
General
-
Target
be021e088ea292b1ce720b6bdc06dfe7fa33dd4bd670a6c404dd5b0146a7c36f.exe
-
Size
2.2MB
-
MD5
9cec338a66ec869714104f703a4feeb8
-
SHA1
98a9ee189816b95c63d5748d427ec9fc9caa3731
-
SHA256
be021e088ea292b1ce720b6bdc06dfe7fa33dd4bd670a6c404dd5b0146a7c36f
-
SHA512
561019a3242d0cfa28a50259d70324cf7e44c48962e979ffa1f39463c2a0e3a8e234d39e12b0a5b4d8f67b4890f91f3520e0cb20a62dc46ae2e83b6844d21583
-
SSDEEP
49152:WfkF6N+25wmWWJTIyvmrE79tIZj+JDk5dbKHjINNwJL9lcBeh:W8gh5WWNIc37TIZjgoV2ywJpl3h
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 4356 rundll32.exe 424 rundll32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2232 wrote to memory of 1912 2232 be021e088ea292b1ce720b6bdc06dfe7fa33dd4bd670a6c404dd5b0146a7c36f.exe 70 PID 2232 wrote to memory of 1912 2232 be021e088ea292b1ce720b6bdc06dfe7fa33dd4bd670a6c404dd5b0146a7c36f.exe 70 PID 2232 wrote to memory of 1912 2232 be021e088ea292b1ce720b6bdc06dfe7fa33dd4bd670a6c404dd5b0146a7c36f.exe 70 PID 1912 wrote to memory of 3744 1912 cmd.exe 72 PID 1912 wrote to memory of 3744 1912 cmd.exe 72 PID 1912 wrote to memory of 3744 1912 cmd.exe 72 PID 3744 wrote to memory of 4356 3744 control.exe 73 PID 3744 wrote to memory of 4356 3744 control.exe 73 PID 3744 wrote to memory of 4356 3744 control.exe 73 PID 4356 wrote to memory of 436 4356 rundll32.exe 74 PID 4356 wrote to memory of 436 4356 rundll32.exe 74 PID 436 wrote to memory of 424 436 RunDll32.exe 75 PID 436 wrote to memory of 424 436 RunDll32.exe 75 PID 436 wrote to memory of 424 436 RunDll32.exe 75
Processes
-
C:\Users\Admin\AppData\Local\Temp\be021e088ea292b1ce720b6bdc06dfe7fa33dd4bd670a6c404dd5b0146a7c36f.exe"C:\Users\Admin\AppData\Local\Temp\be021e088ea292b1ce720b6bdc06dfe7fa33dd4bd670a6c404dd5b0146a7c36f.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c .\Y7TO04.BAT2⤵
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Windows\SysWOW64\control.execoNTRoL.Exe "C:\Users\Admin\AppData\Local\Temp\7zS8B8A0CC7\H6GD.A3"3⤵
- Suspicious use of WriteProcessMemory
PID:3744 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\7zS8B8A0CC7\H6GD.A3"4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\7zS8B8A0CC7\H6GD.A3"5⤵
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\7zS8B8A0CC7\H6GD.A3"6⤵
- Loads dropped DLL
PID:424
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.3MB
MD5be497c014fa4902db2363e3a181c3132
SHA164498d966d0f624526f50afee22839738224c1fb
SHA2564550dbbc6ed9a08b882033ef6a7a2c11c0d638b77bfa8de841d2081099fb9ef3
SHA51243102efdc5f6836c58bb743ccf49105d8851b94dc9a98992ba774318617793733d004b881363c76a897a9e4f4c8dc435ab0affb37c2f860bfcf359d45996c879
-
Filesize
30B
MD51190c9d9d74d2f3e5ff58b7c498a123c
SHA119e1952c1e8d6839d9d4a8d10ea62c09dfda2a41
SHA25672aaf2510a52b8d38e2632b24c37ce0f3db0fbd5ed619bb514221669e0ca2339
SHA512eb78a24f80083f05ce74faf40587e9e2e753ef145dc0f86a656b5244bcb29d46e6cd2f9777528c3d32f4ccf5f3242fd09ebf9d4e6589ff8f3b560be63717f1c5
-
Filesize
2.3MB
MD5be497c014fa4902db2363e3a181c3132
SHA164498d966d0f624526f50afee22839738224c1fb
SHA2564550dbbc6ed9a08b882033ef6a7a2c11c0d638b77bfa8de841d2081099fb9ef3
SHA51243102efdc5f6836c58bb743ccf49105d8851b94dc9a98992ba774318617793733d004b881363c76a897a9e4f4c8dc435ab0affb37c2f860bfcf359d45996c879
-
Filesize
2.3MB
MD5be497c014fa4902db2363e3a181c3132
SHA164498d966d0f624526f50afee22839738224c1fb
SHA2564550dbbc6ed9a08b882033ef6a7a2c11c0d638b77bfa8de841d2081099fb9ef3
SHA51243102efdc5f6836c58bb743ccf49105d8851b94dc9a98992ba774318617793733d004b881363c76a897a9e4f4c8dc435ab0affb37c2f860bfcf359d45996c879