Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
124s -
max time network
133s -
platform
windows10-1703_x64 -
resource
win10-20230915-en -
resource tags
arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system -
submitted
04/10/2023, 15:02
Static task
static1
Behavioral task
behavioral1
Sample
07cae1446f8f39af88de01d0606243820d641dc2dbcd432744f8fcdc9e634ffd.exe
Resource
win10-20230915-en
General
-
Target
07cae1446f8f39af88de01d0606243820d641dc2dbcd432744f8fcdc9e634ffd.exe
-
Size
2.7MB
-
MD5
1b69333cb4b464015f45494b6d377734
-
SHA1
9d145214e60b68c43dce0bd4a186a93951189370
-
SHA256
07cae1446f8f39af88de01d0606243820d641dc2dbcd432744f8fcdc9e634ffd
-
SHA512
13605037ee981eaeffc7f056c048e17a09f2bf71592fdaaf103c8cd4391a07edebdb134c000ea6a14ca1d4b0a80d0fbdcfb2ccf5260ed6d23602f949563681e0
-
SSDEEP
49152:ufcYbzpxzJK38fCJUimpLwFr09DxPDFcrGXFJI9SKQVHpZSGsSazUgEBsf+N:KzJraenpMx09lPK6FJqsHLuSUU3sa
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 4120 rundll32.exe 4416 rundll32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3928 wrote to memory of 5064 3928 07cae1446f8f39af88de01d0606243820d641dc2dbcd432744f8fcdc9e634ffd.exe 70 PID 3928 wrote to memory of 5064 3928 07cae1446f8f39af88de01d0606243820d641dc2dbcd432744f8fcdc9e634ffd.exe 70 PID 3928 wrote to memory of 5064 3928 07cae1446f8f39af88de01d0606243820d641dc2dbcd432744f8fcdc9e634ffd.exe 70 PID 5064 wrote to memory of 2576 5064 cmd.exe 72 PID 5064 wrote to memory of 2576 5064 cmd.exe 72 PID 5064 wrote to memory of 2576 5064 cmd.exe 72 PID 2576 wrote to memory of 4120 2576 control.exe 73 PID 2576 wrote to memory of 4120 2576 control.exe 73 PID 2576 wrote to memory of 4120 2576 control.exe 73 PID 4120 wrote to memory of 3372 4120 rundll32.exe 74 PID 4120 wrote to memory of 3372 4120 rundll32.exe 74 PID 3372 wrote to memory of 4416 3372 RunDll32.exe 75 PID 3372 wrote to memory of 4416 3372 RunDll32.exe 75 PID 3372 wrote to memory of 4416 3372 RunDll32.exe 75
Processes
-
C:\Users\Admin\AppData\Local\Temp\07cae1446f8f39af88de01d0606243820d641dc2dbcd432744f8fcdc9e634ffd.exe"C:\Users\Admin\AppData\Local\Temp\07cae1446f8f39af88de01d0606243820d641dc2dbcd432744f8fcdc9e634ffd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c .\G0~.bat2⤵
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Windows\SysWOW64\control.exeCOnTROl "C:\Users\Admin\AppData\Local\Temp\7zS85FC17C7\Wy.22"3⤵
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\7zS85FC17C7\Wy.22"4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\7zS85FC17C7\Wy.22"5⤵
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\7zS85FC17C7\Wy.22"6⤵
- Loads dropped DLL
PID:4416
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
25B
MD5b25e92b327ffd9a084f840c4f3637ec0
SHA1f06d9cb82aeab24401cd0b78e5862931670402fe
SHA256cfd160efd46bd1d2891cd38449452a025d68ef3e2a04dd38f17e75b4b7a397cf
SHA5120ece621e39eed0f76543fe828e8fe0fe1ce90534e4868dd112426138b53ad050e04bbdeee1033df0e6f2f230978397eb5ac3203585f05a43c534aa8c1cd22cad
-
Filesize
2.7MB
MD562b64bb6e4da0b58f9d7a80936f87ec8
SHA181497b85d4c44d7d721db732eb3a2cb00bb71787
SHA2560dcc2a89aaae58dc042b02f004c949c416953a7efd493cfa0efee74b6f274493
SHA51239cf4431f7a1027286da3017aa75b5dc6ef9c84809e5c0ec4393f3ca63adceb10669ae8336ca3a8488eebe6fab99b8435697f7ab0e4dadccd2ddf9bbfae398ca
-
Filesize
2.7MB
MD562b64bb6e4da0b58f9d7a80936f87ec8
SHA181497b85d4c44d7d721db732eb3a2cb00bb71787
SHA2560dcc2a89aaae58dc042b02f004c949c416953a7efd493cfa0efee74b6f274493
SHA51239cf4431f7a1027286da3017aa75b5dc6ef9c84809e5c0ec4393f3ca63adceb10669ae8336ca3a8488eebe6fab99b8435697f7ab0e4dadccd2ddf9bbfae398ca
-
Filesize
2.7MB
MD562b64bb6e4da0b58f9d7a80936f87ec8
SHA181497b85d4c44d7d721db732eb3a2cb00bb71787
SHA2560dcc2a89aaae58dc042b02f004c949c416953a7efd493cfa0efee74b6f274493
SHA51239cf4431f7a1027286da3017aa75b5dc6ef9c84809e5c0ec4393f3ca63adceb10669ae8336ca3a8488eebe6fab99b8435697f7ab0e4dadccd2ddf9bbfae398ca