Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/10/2023, 01:41

General

  • Target

    3c0d9ad0175f06c3d5dc58179a7e1940exe_JC.exe

  • Size

    681KB

  • MD5

    3c0d9ad0175f06c3d5dc58179a7e1940

  • SHA1

    fb24c556040b6504763ff7c7bbcb8d233d1706d2

  • SHA256

    afab4b2c73a90a5a1d5420227f01e74c594f34ad1eb6651fdff7e4ad2f00c9cf

  • SHA512

    70048b0db5677596afff7171587b13a857f0c2a601091fe80ce4f3ec7620820093844150f1abb134371e9bbbab6bb0e6b1ba7675c9f30164204459611fc818cf

  • SSDEEP

    1536:OKD0A2T3vLbsih9e8bTTpb/IgQmP9zKcTDB4w/UjlQ/dpKRq:352T3siXei5bcmP9JfUjW

Score
7/10

Malware Config

Signatures

  • ASPack v2.12-2.42 1 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3c0d9ad0175f06c3d5dc58179a7e1940exe_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\3c0d9ad0175f06c3d5dc58179a7e1940exe_JC.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:3512
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c c:\$$$$$.bat
      2⤵
        PID:4496

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\drivers32\Tomb Raider - The Angel of Darkness No-Cd Crack.exe

      Filesize

      681KB

      MD5

      3c0d9ad0175f06c3d5dc58179a7e1940

      SHA1

      fb24c556040b6504763ff7c7bbcb8d233d1706d2

      SHA256

      afab4b2c73a90a5a1d5420227f01e74c594f34ad1eb6651fdff7e4ad2f00c9cf

      SHA512

      70048b0db5677596afff7171587b13a857f0c2a601091fe80ce4f3ec7620820093844150f1abb134371e9bbbab6bb0e6b1ba7675c9f30164204459611fc818cf

    • \??\c:\$$$$$.bat

      Filesize

      212B

      MD5

      0f16df03d6d8738b585f27656cc2e2e5

      SHA1

      6edefa0b44933f095ee26cfa39b4e6bdbaf94efd

      SHA256

      495801b4feebc83b0144fb09c54fc5771c00f6d79a71bf35638ee86cddd6322d

      SHA512

      4874fda8ffd941072dfe16224160c6ac4aeebcb83e06c4bfcbb0aef895dc31c515d260e59a7e0a87b17719b47e3860d9d82669a9cbd34812f1d8d3a72064e50d

    • memory/3512-0-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/3512-513-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/3512-821-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB