Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
181s -
max time network
189s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2023, 17:09
Static task
static1
Behavioral task
behavioral1
Sample
86cf60cbedcfc12834bf8f981f835fca618eb873b9c8fd67d16a405ff45d6900.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
86cf60cbedcfc12834bf8f981f835fca618eb873b9c8fd67d16a405ff45d6900.exe
Resource
win10v2004-20230915-en
General
-
Target
86cf60cbedcfc12834bf8f981f835fca618eb873b9c8fd67d16a405ff45d6900.exe
-
Size
15.3MB
-
MD5
ffc6ec71fdb2cec54fcf1a14082fcc16
-
SHA1
944d80d71dddb441f75c716e50810ea317671c58
-
SHA256
86cf60cbedcfc12834bf8f981f835fca618eb873b9c8fd67d16a405ff45d6900
-
SHA512
6f7cd64fe69091e548252965965e938d94534f53c13a8f9afe717a9021896a6fd7e7e3e59b788de2ed5c32160b5cfaf42481b477b2ae25204cd5a549360646a1
-
SSDEEP
393216:mWwdrW0M4mjWU1P33PF9R8wjRUG3SyRMK4a:mW2rFaWU1fPr9RG+wa
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4192 08C11B36.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 86cf60cbedcfc12834bf8f981f835fca618eb873b9c8fd67d16a405ff45d6900.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 86cf60cbedcfc12834bf8f981f835fca618eb873b9c8fd67d16a405ff45d6900.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS 86cf60cbedcfc12834bf8f981f835fca618eb873b9c8fd67d16a405ff45d6900.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer 86cf60cbedcfc12834bf8f981f835fca618eb873b9c8fd67d16a405ff45d6900.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardProduct 86cf60cbedcfc12834bf8f981f835fca618eb873b9c8fd67d16a405ff45d6900.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3196 86cf60cbedcfc12834bf8f981f835fca618eb873b9c8fd67d16a405ff45d6900.exe 3196 86cf60cbedcfc12834bf8f981f835fca618eb873b9c8fd67d16a405ff45d6900.exe 4192 08C11B36.exe 4192 08C11B36.exe 4192 08C11B36.exe 4192 08C11B36.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3196 wrote to memory of 4192 3196 86cf60cbedcfc12834bf8f981f835fca618eb873b9c8fd67d16a405ff45d6900.exe 86 PID 3196 wrote to memory of 4192 3196 86cf60cbedcfc12834bf8f981f835fca618eb873b9c8fd67d16a405ff45d6900.exe 86 PID 3196 wrote to memory of 4192 3196 86cf60cbedcfc12834bf8f981f835fca618eb873b9c8fd67d16a405ff45d6900.exe 86 PID 4192 wrote to memory of 3468 4192 08C11B36.exe 90 PID 4192 wrote to memory of 3468 4192 08C11B36.exe 90 PID 4192 wrote to memory of 3468 4192 08C11B36.exe 90 PID 4192 wrote to memory of 5052 4192 08C11B36.exe 91 PID 4192 wrote to memory of 5052 4192 08C11B36.exe 91 PID 4192 wrote to memory of 5052 4192 08C11B36.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\86cf60cbedcfc12834bf8f981f835fca618eb873b9c8fd67d16a405ff45d6900.exe"C:\Users\Admin\AppData\Local\Temp\86cf60cbedcfc12834bf8f981f835fca618eb873b9c8fd67d16a405ff45d6900.exe"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Users\Admin\AppData\Local\Temp\08C11B36.exeC:\Users\Admin\AppData\Local\Temp\08C11B36.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Local\Temp\\*.exe"3⤵PID:3468
-
-
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Local\Temp\\*.dll"3⤵PID:5052
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14.5MB
MD57ee08644c2578347d894d74a7339e07d
SHA12984dc83d6bb0eec2de893388f5948915c57d46d
SHA25685b776cec7644866df06ba496bd49506cdc7f61a05c9402278299061d53810ca
SHA51236f599e489f8a6a9cf21cfc689a6403c1fe8e177bddd3065310c2c79dfdd94e564ac556fbefb042524fbf1c66087e50c21bb721a00d3f95a02a2bc5dcd8317aa
-
Filesize
14.5MB
MD57ee08644c2578347d894d74a7339e07d
SHA12984dc83d6bb0eec2de893388f5948915c57d46d
SHA25685b776cec7644866df06ba496bd49506cdc7f61a05c9402278299061d53810ca
SHA51236f599e489f8a6a9cf21cfc689a6403c1fe8e177bddd3065310c2c79dfdd94e564ac556fbefb042524fbf1c66087e50c21bb721a00d3f95a02a2bc5dcd8317aa
-
Filesize
2KB
MD58b26a59dda868c8c80893010699ad6c0
SHA1a7d2a2449a937bfe1f582532d7b45c72f7536f4a
SHA256832c061cf735e4d10685136d26f78a6ec21ffc50f4de477f39652291eb6cc423
SHA5127c4f032ae0fb858614717fd43ba12a5eb1ce6723fb52afd220f5ed8f87b3acadc8030406c3201576f1bcadec600dd7cc725c9509a058c57eac92ab417e173c0f
-
Filesize
1KB
MD5e031f4c1d0e785fdaf57722209db4c2f
SHA1796976bc93402f9c6fc69f5e9e4da15353b6c8b9
SHA256f6cd1744ab2d7eb6e071ae76f8a9ccee394088564d1b8b1b98fd732dc09f33b9
SHA5120158b310e36cb06ade5b320756534199008aa996e01ebb82a664e3f1d27f2ae63f63d6ca4e2f30b6e64e65fd3babb25a9ee20dd46e7731fb19ed684a200d72a2
-
Filesize
1KB
MD58a097fdbe7ebbaf26404fcd04fe42379
SHA15ac06e5079cce795ee78853ba19a2adba7662550
SHA256888aa2c0cc55820056057651328b70cc927c25f4fac021ae6db0f40067c5bf27
SHA512a48c46fd9735f7992e24d8f366757bac7e94294967b8d443aac0cb244f7b07befc6b5b408e9b26976e2daf59a9a33c879534930d758b50cfa8940817d7e2dc45