Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
07/10/2023, 09:12
Static task
static1
Behavioral task
behavioral1
Sample
2d271cd1e852c3a8d907522f7fc25557598d60060f32611d0774cf452ca0c301.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2d271cd1e852c3a8d907522f7fc25557598d60060f32611d0774cf452ca0c301.exe
Resource
win10v2004-20230915-en
General
-
Target
2d271cd1e852c3a8d907522f7fc25557598d60060f32611d0774cf452ca0c301.exe
-
Size
6.2MB
-
MD5
c4752b42561019470db0d2dc83a5dd0d
-
SHA1
8850e072dca0de6a5d4e96149f7e1a9caed83112
-
SHA256
2d271cd1e852c3a8d907522f7fc25557598d60060f32611d0774cf452ca0c301
-
SHA512
2cb7a156cf0bde5d49e9fa4773d43f45c9c43015d31a759d901819cb9f35284fb04c6e39ae373f482ff553a52146b1f58e86fb18aa84925d70170ac07deecb04
-
SSDEEP
98304:w+mQv2z8N+UVqtyNsKpj4H362EPNmfV6FLOAkGkzdnEVomFHKnP:wdYaty2KpkHWNmf8FLOyomFHKnP
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2580 2d271cd1e852c3a8d907522f7fc25557598d60060f32611d0774cf452ca0c301.exe 2580 2d271cd1e852c3a8d907522f7fc25557598d60060f32611d0774cf452ca0c301.exe 2580 2d271cd1e852c3a8d907522f7fc25557598d60060f32611d0774cf452ca0c301.exe 2580 2d271cd1e852c3a8d907522f7fc25557598d60060f32611d0774cf452ca0c301.exe 2580 2d271cd1e852c3a8d907522f7fc25557598d60060f32611d0774cf452ca0c301.exe 2580 2d271cd1e852c3a8d907522f7fc25557598d60060f32611d0774cf452ca0c301.exe 2580 2d271cd1e852c3a8d907522f7fc25557598d60060f32611d0774cf452ca0c301.exe 2580 2d271cd1e852c3a8d907522f7fc25557598d60060f32611d0774cf452ca0c301.exe 2580 2d271cd1e852c3a8d907522f7fc25557598d60060f32611d0774cf452ca0c301.exe 2580 2d271cd1e852c3a8d907522f7fc25557598d60060f32611d0774cf452ca0c301.exe 2580 2d271cd1e852c3a8d907522f7fc25557598d60060f32611d0774cf452ca0c301.exe 2580 2d271cd1e852c3a8d907522f7fc25557598d60060f32611d0774cf452ca0c301.exe 2580 2d271cd1e852c3a8d907522f7fc25557598d60060f32611d0774cf452ca0c301.exe 2580 2d271cd1e852c3a8d907522f7fc25557598d60060f32611d0774cf452ca0c301.exe 2580 2d271cd1e852c3a8d907522f7fc25557598d60060f32611d0774cf452ca0c301.exe 2580 2d271cd1e852c3a8d907522f7fc25557598d60060f32611d0774cf452ca0c301.exe 2580 2d271cd1e852c3a8d907522f7fc25557598d60060f32611d0774cf452ca0c301.exe 2580 2d271cd1e852c3a8d907522f7fc25557598d60060f32611d0774cf452ca0c301.exe 2580 2d271cd1e852c3a8d907522f7fc25557598d60060f32611d0774cf452ca0c301.exe 2580 2d271cd1e852c3a8d907522f7fc25557598d60060f32611d0774cf452ca0c301.exe 2580 2d271cd1e852c3a8d907522f7fc25557598d60060f32611d0774cf452ca0c301.exe 2580 2d271cd1e852c3a8d907522f7fc25557598d60060f32611d0774cf452ca0c301.exe 2580 2d271cd1e852c3a8d907522f7fc25557598d60060f32611d0774cf452ca0c301.exe 2580 2d271cd1e852c3a8d907522f7fc25557598d60060f32611d0774cf452ca0c301.exe 2580 2d271cd1e852c3a8d907522f7fc25557598d60060f32611d0774cf452ca0c301.exe 2580 2d271cd1e852c3a8d907522f7fc25557598d60060f32611d0774cf452ca0c301.exe 2580 2d271cd1e852c3a8d907522f7fc25557598d60060f32611d0774cf452ca0c301.exe 2580 2d271cd1e852c3a8d907522f7fc25557598d60060f32611d0774cf452ca0c301.exe 2580 2d271cd1e852c3a8d907522f7fc25557598d60060f32611d0774cf452ca0c301.exe 2580 2d271cd1e852c3a8d907522f7fc25557598d60060f32611d0774cf452ca0c301.exe 2580 2d271cd1e852c3a8d907522f7fc25557598d60060f32611d0774cf452ca0c301.exe 2580 2d271cd1e852c3a8d907522f7fc25557598d60060f32611d0774cf452ca0c301.exe 2580 2d271cd1e852c3a8d907522f7fc25557598d60060f32611d0774cf452ca0c301.exe 2580 2d271cd1e852c3a8d907522f7fc25557598d60060f32611d0774cf452ca0c301.exe 2580 2d271cd1e852c3a8d907522f7fc25557598d60060f32611d0774cf452ca0c301.exe 2580 2d271cd1e852c3a8d907522f7fc25557598d60060f32611d0774cf452ca0c301.exe 2580 2d271cd1e852c3a8d907522f7fc25557598d60060f32611d0774cf452ca0c301.exe 2580 2d271cd1e852c3a8d907522f7fc25557598d60060f32611d0774cf452ca0c301.exe 2580 2d271cd1e852c3a8d907522f7fc25557598d60060f32611d0774cf452ca0c301.exe 2580 2d271cd1e852c3a8d907522f7fc25557598d60060f32611d0774cf452ca0c301.exe 2580 2d271cd1e852c3a8d907522f7fc25557598d60060f32611d0774cf452ca0c301.exe 2580 2d271cd1e852c3a8d907522f7fc25557598d60060f32611d0774cf452ca0c301.exe 2580 2d271cd1e852c3a8d907522f7fc25557598d60060f32611d0774cf452ca0c301.exe 2580 2d271cd1e852c3a8d907522f7fc25557598d60060f32611d0774cf452ca0c301.exe 2580 2d271cd1e852c3a8d907522f7fc25557598d60060f32611d0774cf452ca0c301.exe 2580 2d271cd1e852c3a8d907522f7fc25557598d60060f32611d0774cf452ca0c301.exe 2580 2d271cd1e852c3a8d907522f7fc25557598d60060f32611d0774cf452ca0c301.exe 2580 2d271cd1e852c3a8d907522f7fc25557598d60060f32611d0774cf452ca0c301.exe 2580 2d271cd1e852c3a8d907522f7fc25557598d60060f32611d0774cf452ca0c301.exe 2580 2d271cd1e852c3a8d907522f7fc25557598d60060f32611d0774cf452ca0c301.exe 2580 2d271cd1e852c3a8d907522f7fc25557598d60060f32611d0774cf452ca0c301.exe 2580 2d271cd1e852c3a8d907522f7fc25557598d60060f32611d0774cf452ca0c301.exe 2580 2d271cd1e852c3a8d907522f7fc25557598d60060f32611d0774cf452ca0c301.exe 2580 2d271cd1e852c3a8d907522f7fc25557598d60060f32611d0774cf452ca0c301.exe 2580 2d271cd1e852c3a8d907522f7fc25557598d60060f32611d0774cf452ca0c301.exe 2580 2d271cd1e852c3a8d907522f7fc25557598d60060f32611d0774cf452ca0c301.exe 2580 2d271cd1e852c3a8d907522f7fc25557598d60060f32611d0774cf452ca0c301.exe 2580 2d271cd1e852c3a8d907522f7fc25557598d60060f32611d0774cf452ca0c301.exe 2580 2d271cd1e852c3a8d907522f7fc25557598d60060f32611d0774cf452ca0c301.exe 2580 2d271cd1e852c3a8d907522f7fc25557598d60060f32611d0774cf452ca0c301.exe 2580 2d271cd1e852c3a8d907522f7fc25557598d60060f32611d0774cf452ca0c301.exe 2580 2d271cd1e852c3a8d907522f7fc25557598d60060f32611d0774cf452ca0c301.exe 2580 2d271cd1e852c3a8d907522f7fc25557598d60060f32611d0774cf452ca0c301.exe 2580 2d271cd1e852c3a8d907522f7fc25557598d60060f32611d0774cf452ca0c301.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2580 2d271cd1e852c3a8d907522f7fc25557598d60060f32611d0774cf452ca0c301.exe 2580 2d271cd1e852c3a8d907522f7fc25557598d60060f32611d0774cf452ca0c301.exe 2580 2d271cd1e852c3a8d907522f7fc25557598d60060f32611d0774cf452ca0c301.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d271cd1e852c3a8d907522f7fc25557598d60060f32611d0774cf452ca0c301.exe"C:\Users\Admin\AppData\Local\Temp\2d271cd1e852c3a8d907522f7fc25557598d60060f32611d0774cf452ca0c301.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2580
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23B
MD5fe48b29e9146749d799b647e473a2777
SHA130bbb9bc2908d55569293f032eab66e914151f3f
SHA2568dfeb24ee7e0b650f309d478eb284871030a2ac486b4289c3415308a792c702b
SHA512b51515c4e460bd708e59f7ca19c85ec6fd4d2bb24222da1a938ffb27d4d376a3af066142c10352ed97c8caff35297178dca92618af29243b6513b4d64f83e4e3