Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
127s -
max time network
132s -
platform
windows10-1703_x64 -
resource
win10-20230915-en -
resource tags
arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system -
submitted
09/10/2023, 06:45
Static task
static1
Behavioral task
behavioral1
Sample
58e2d7dc8df883ac447bb2cb692696c1825ff4d42094466714539279a235cb56.exe
Resource
win10-20230915-en
General
-
Target
58e2d7dc8df883ac447bb2cb692696c1825ff4d42094466714539279a235cb56.exe
-
Size
2.6MB
-
MD5
e4441f76160ca931564c29e82e8f2bb2
-
SHA1
e37ddb66e5938aded1f3c9dac426e24d20a9c47b
-
SHA256
58e2d7dc8df883ac447bb2cb692696c1825ff4d42094466714539279a235cb56
-
SHA512
3af898f568bb6f2db85cb69de68463313895040184c6d57a7a90bb6a249fbf6ea9143671010ad7e59518c2d625b331e913b2d3818c8c392ce3d85e124f71cfc3
-
SSDEEP
49152:ufyKuNA9M2rmabiSDaj2fscAHOaLMsirHYfz9wdbOutG:S+Ay2rmYiSw2f4OaLMsq4r9wdbq
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 344 rundll32.exe 608 rundll32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4176 wrote to memory of 2880 4176 58e2d7dc8df883ac447bb2cb692696c1825ff4d42094466714539279a235cb56.exe 70 PID 4176 wrote to memory of 2880 4176 58e2d7dc8df883ac447bb2cb692696c1825ff4d42094466714539279a235cb56.exe 70 PID 4176 wrote to memory of 2880 4176 58e2d7dc8df883ac447bb2cb692696c1825ff4d42094466714539279a235cb56.exe 70 PID 2880 wrote to memory of 228 2880 cmd.exe 72 PID 2880 wrote to memory of 228 2880 cmd.exe 72 PID 2880 wrote to memory of 228 2880 cmd.exe 72 PID 228 wrote to memory of 344 228 control.exe 73 PID 228 wrote to memory of 344 228 control.exe 73 PID 228 wrote to memory of 344 228 control.exe 73 PID 344 wrote to memory of 2664 344 rundll32.exe 74 PID 344 wrote to memory of 2664 344 rundll32.exe 74 PID 2664 wrote to memory of 608 2664 RunDll32.exe 75 PID 2664 wrote to memory of 608 2664 RunDll32.exe 75 PID 2664 wrote to memory of 608 2664 RunDll32.exe 75
Processes
-
C:\Users\Admin\AppData\Local\Temp\58e2d7dc8df883ac447bb2cb692696c1825ff4d42094466714539279a235cb56.exe"C:\Users\Admin\AppData\Local\Temp\58e2d7dc8df883ac447bb2cb692696c1825ff4d42094466714539279a235cb56.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4176 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c .\UV8U8NGG.Bat2⤵
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\SysWOW64\control.execOnTrOl "C:\Users\Admin\AppData\Local\Temp\7zS050682D7\yRTDB_.DK7"3⤵
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\7zS050682D7\yRTDB_.DK7"4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:344 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\7zS050682D7\yRTDB_.DK7"5⤵
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\7zS050682D7\yRTDB_.DK7"6⤵
- Loads dropped DLL
PID:608
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
26B
MD547a0be4b4df01c39cf753a370ee53eef
SHA12c4a552e9881c1e2fb587badb2a271c604b0b904
SHA256b60477096c629a9e19f794f2f70cd92b40b6d343f70b64777395980f9c415f11
SHA512c42e84c69ac820a679165213a9c734df4e28f7b39b40d044fbef357bb3de70dae269642798665dc83f1a130a680fd8b306296f88fb01490080544d03e9f0920b
-
Filesize
2.6MB
MD524e8c5d32c8e0dd622f2c87501af9831
SHA13bdf2182d52bda3ed762607580bf306244600d08
SHA25636b3178e88bb2a1b9edb74e5d3662d7a55d2d0ce0f36a3885e982b082801f124
SHA512174644c73406689b608b014e73f08f1eedcf169cfa95be594e9891de20e694f4392385455335c5aa920baaba673beb71191570e82548b3e8fc0ddf85ffc7a4e5
-
Filesize
2.6MB
MD524e8c5d32c8e0dd622f2c87501af9831
SHA13bdf2182d52bda3ed762607580bf306244600d08
SHA25636b3178e88bb2a1b9edb74e5d3662d7a55d2d0ce0f36a3885e982b082801f124
SHA512174644c73406689b608b014e73f08f1eedcf169cfa95be594e9891de20e694f4392385455335c5aa920baaba673beb71191570e82548b3e8fc0ddf85ffc7a4e5
-
Filesize
2.6MB
MD524e8c5d32c8e0dd622f2c87501af9831
SHA13bdf2182d52bda3ed762607580bf306244600d08
SHA25636b3178e88bb2a1b9edb74e5d3662d7a55d2d0ce0f36a3885e982b082801f124
SHA512174644c73406689b608b014e73f08f1eedcf169cfa95be594e9891de20e694f4392385455335c5aa920baaba673beb71191570e82548b3e8fc0ddf85ffc7a4e5