Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/10/2023, 08:50

General

  • Target

    f97c4cb2a7d46140bb7cd12612622aab6fe197b4ac9235080f289cbb8fd5ad1e.exe

  • Size

    3.8MB

  • MD5

    c28142b15499595613a482990d3ed5ea

  • SHA1

    6cc4c1b0e3ccb71f48d3e5cb6920d8a3fac05cd1

  • SHA256

    f97c4cb2a7d46140bb7cd12612622aab6fe197b4ac9235080f289cbb8fd5ad1e

  • SHA512

    f2bfd1d793d6dd11123cef66954329aa0fceb9ae47500b3aa8cb4a55e7cddcd31471306fcadeedfc55b6a4d6799feaf36afec45aa9cb19540e4179a14068dab4

  • SSDEEP

    49152:hW32NYoVYKmsB7UYzXQRPbyV1w1xXG+I/WGC/qKOPFzGkI3RtZnNs4T3Bet25Ylj:QBATzgQVr+/GC/qJPa1x1YhvC

Score
7/10
upx

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f97c4cb2a7d46140bb7cd12612622aab6fe197b4ac9235080f289cbb8fd5ad1e.exe
    "C:\Users\Admin\AppData\Local\Temp\f97c4cb2a7d46140bb7cd12612622aab6fe197b4ac9235080f289cbb8fd5ad1e.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4376
    • C:\Users\Public\Downloads\eE9vQ5cA\Wpddzoiq.exe
      "C:\Users\Public\Downloads\eE9vQ5cA\Wpddzoiq.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4716
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c echo.>c:\xxxx.ini
        3⤵
          PID:1800
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c echo.>c:\xxxx.ini
          3⤵
            PID:4044
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c echo.>c:\xxxx.ini
            3⤵
              PID:4844
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c echo.>c:\xxxx.ini
              3⤵
                PID:2728

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\_ir_tu2_temp_0\IRIMG1.JPG

            Filesize

            6KB

            MD5

            e39405e85e09f64ccde0f59392317dd3

            SHA1

            9c76db4b3d8c7972e7995ecfb1e3c47ee94fd14b

            SHA256

            cfd9677e1c0e10b1507f520c4ecd40f68db78154c0d4e6563403d540f3bf829f

            SHA512

            6733f330145b48d23c023c664090f4f240e9bbeb8368b486c8ee8682ec6a930b73275e24075648d1aa7e01db1ec7b7e259286917a006ba9af8fb7cba3439070a

          • C:\Users\Admin\AppData\Local\Temp\_ir_tu2_temp_0\IRIMG4.JPG

            Filesize

            36KB

            MD5

            f6bf82a293b69aa5b47d4e2de305d45a

            SHA1

            4948716616d4bbe68be2b4c5bf95350402d3f96f

            SHA256

            6a9368cdd7b3ff9b590e206c3536569bc45c338966d0059784959f73fe6281e0

            SHA512

            edf0f3ee60a620cf886184c1014f38d0505aac9e3703d61d7074cfb27d6922f80e570d1a3891593606a09f1296a88c8770445761c11c390a99a5341ee56478aa

          • C:\Users\Public\Downloads\eE9vQ5cA\Edge.jpg

            Filesize

            358KB

            MD5

            22df74ec2eff800ecfb72489d53ca234

            SHA1

            6b065ff2157457e436b24c2cad35ea650557dc3e

            SHA256

            a3c91eaeeed3cde1389f9bcf469891d3f2b358e9ef8a76563468aa13ce8b1c85

            SHA512

            197270dd385e5092acfe12b7bbd3015e744b379b9861fa00c8bb94af833e6d19163a2f67159e9c21e8632f5ef55fa31cdf72b81304d62a9bcd224d6d09c49689

          • C:\Users\Public\Downloads\eE9vQ5cA\Wpddzoiq.dat

            Filesize

            132KB

            MD5

            d44982a5ef72ca34d9faa8d983e41af9

            SHA1

            d60a2e963f14d20dc895f3648d3eff53c4496509

            SHA256

            4fad18c2520c6a9e06a87d682da4c58a12d3074867c322f0e6bd3948dca1f20b

            SHA512

            e99c59a08257d9bf75e1e2f985373a3b0f38d373c85fd783ae0528a39e02165faa200c24c0fe62db6f69572f10fa00c8fdd5ae806a1819247ba674a5cba1acc3

          • C:\Users\Public\Downloads\eE9vQ5cA\Wpddzoiq.exe

            Filesize

            529KB

            MD5

            49d595ab380b7c7a4cd6916eeb4dfe6f

            SHA1

            b84649fce92cc0e7a4d25599cc15ffaf312edc0b

            SHA256

            207d856a56e97f2fdab243742f0cfcd1ba8b5814dc65b3798e54d022ce719661

            SHA512

            d00ed0d9baae96ccbaf1262b4a4aaf4468e4ace6cebcea81e74d830bf414d9bc61068b8fb0eefa742add14aec47284f3adc11be26c8b8d66bfae4c498f2a4110

          • C:\Users\Public\Downloads\eE9vQ5cA\edge.xml

            Filesize

            53KB

            MD5

            21f454235b118a879f1bceda32ab8b63

            SHA1

            b2c3b47967b2b27b081ac1e49558b1b062e24292

            SHA256

            a82af291ebfc385f822bcc84fd0fe6b31a9c7a86f38bee3e3a05528c38f70524

            SHA512

            089023b6142444f1c2bb46acc9c991100287fca923714182c298639310ace703fae9009f94b5b2f168d7f11259342318c78a69a1bc014c877f438d93b10f0ed5

          • \??\c:\xxxx.ini

            Filesize

            2B

            MD5

            81051bcc2cf1bedf378224b0a93e2877

            SHA1

            ba8ab5a0280b953aa97435ff8946cbcbb2755a27

            SHA256

            7eb70257593da06f682a3ddda54a9d260d4fc514f645237f5ca74b08f8da61a6

            SHA512

            1b302a2f1e624a5fb5ad94ddc4e5f8bfd74d26fa37512d0e5face303d8c40eee0d0ffa3649f5da43f439914d128166cb6c4774a7caa3b174d7535451eb697b5d

          • \??\c:\xxxx.ini

            Filesize

            2B

            MD5

            81051bcc2cf1bedf378224b0a93e2877

            SHA1

            ba8ab5a0280b953aa97435ff8946cbcbb2755a27

            SHA256

            7eb70257593da06f682a3ddda54a9d260d4fc514f645237f5ca74b08f8da61a6

            SHA512

            1b302a2f1e624a5fb5ad94ddc4e5f8bfd74d26fa37512d0e5face303d8c40eee0d0ffa3649f5da43f439914d128166cb6c4774a7caa3b174d7535451eb697b5d

          • memory/4716-6-0x0000000000400000-0x0000000000558000-memory.dmp

            Filesize

            1.3MB

          • memory/4716-28-0x0000000003430000-0x0000000003431000-memory.dmp

            Filesize

            4KB

          • memory/4716-31-0x0000000003780000-0x0000000003792000-memory.dmp

            Filesize

            72KB

          • memory/4716-33-0x0000000010000000-0x0000000010061000-memory.dmp

            Filesize

            388KB

          • memory/4716-50-0x0000000000400000-0x0000000000558000-memory.dmp

            Filesize

            1.3MB