Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
128s -
max time network
140s -
platform
windows10-1703_x64 -
resource
win10-20230915-en -
resource tags
arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system -
submitted
14/10/2023, 04:45
Static task
static1
Behavioral task
behavioral1
Sample
b702e3366e0587bf6e5e4bc5f9292179a4f22506b841f19d3e48d085f5caa7b1.exe
Resource
win10-20230915-en
General
-
Target
b702e3366e0587bf6e5e4bc5f9292179a4f22506b841f19d3e48d085f5caa7b1.exe
-
Size
2.3MB
-
MD5
8903fbdd0570c31aee24c79ac2f1355d
-
SHA1
af81f83b7c45ad17bc36d0cd3ae869689a2d9efd
-
SHA256
b702e3366e0587bf6e5e4bc5f9292179a4f22506b841f19d3e48d085f5caa7b1
-
SHA512
3d05466971f2dca9a78d2615b560e642d244659beefb780a597e0045c72d0eec48b681d6f12eb3ee07e43ccbcbfc55172bdaaa6a71757f6dd7f98afaf574e470
-
SSDEEP
49152:mcB+gN8LK5qIbk6nudlDZnZMOrdMh/NRGEqVWU+Qvqxm8:mDKXuzYidMhLY+Qvqxm8
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 3212 rundll32.exe 1284 rundll32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3204 wrote to memory of 3432 3204 b702e3366e0587bf6e5e4bc5f9292179a4f22506b841f19d3e48d085f5caa7b1.exe 70 PID 3204 wrote to memory of 3432 3204 b702e3366e0587bf6e5e4bc5f9292179a4f22506b841f19d3e48d085f5caa7b1.exe 70 PID 3204 wrote to memory of 3432 3204 b702e3366e0587bf6e5e4bc5f9292179a4f22506b841f19d3e48d085f5caa7b1.exe 70 PID 3432 wrote to memory of 1912 3432 cmd.exe 72 PID 3432 wrote to memory of 1912 3432 cmd.exe 72 PID 3432 wrote to memory of 1912 3432 cmd.exe 72 PID 1912 wrote to memory of 3212 1912 control.exe 73 PID 1912 wrote to memory of 3212 1912 control.exe 73 PID 1912 wrote to memory of 3212 1912 control.exe 73 PID 3212 wrote to memory of 3480 3212 rundll32.exe 74 PID 3212 wrote to memory of 3480 3212 rundll32.exe 74 PID 3480 wrote to memory of 1284 3480 RunDll32.exe 75 PID 3480 wrote to memory of 1284 3480 RunDll32.exe 75 PID 3480 wrote to memory of 1284 3480 RunDll32.exe 75
Processes
-
C:\Users\Admin\AppData\Local\Temp\b702e3366e0587bf6e5e4bc5f9292179a4f22506b841f19d3e48d085f5caa7b1.exe"C:\Users\Admin\AppData\Local\Temp\b702e3366e0587bf6e5e4bc5f9292179a4f22506b841f19d3e48d085f5caa7b1.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3204 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c .\FK4u.CMD2⤵
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Windows\SysWOW64\control.execonTrOL "C:\Users\Admin\AppData\Local\Temp\7zS48C57BB7\R1.OUW"3⤵
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\7zS48C57BB7\R1.OUW"4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\7zS48C57BB7\R1.OUW"5⤵
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\7zS48C57BB7\R1.OUW"6⤵
- Loads dropped DLL
PID:1284
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
26B
MD558c7b73acf9395528f5aefcce8c17e06
SHA1ad448ccceedddcba23c2a634da6eaf67d0eb2fd2
SHA256f052ca088f8ac5add873e9e1226ad549afd381edd1d9ee658606d3d8b1f48991
SHA5122cbd1395b94154420a4c0221edacaf64b142ac0c79e8012a41ec04558a211a345e1cea02872cd685f2db50027d8eb481bcfbc5747e75ff3debe9eaf0408d84ed
-
Filesize
2.3MB
MD5735f53bff44ab6f223fc06a87d8a0ff1
SHA1f9d55f0881dcb6c34ed58a354647573199b01d5f
SHA256bdb3fe32149afaae745ce894ae20b6caf471977717df8449ffcefcf47c9e19c6
SHA5128cb3ad0277f875ff44e18e6f0e2dc3e0b83f5f0a0e224e1e753eb17e2ecc1cedc362275d84ab05c942e91052e4c942e44458f99813adbfea3bfc371436a6f6bf
-
Filesize
2.3MB
MD5735f53bff44ab6f223fc06a87d8a0ff1
SHA1f9d55f0881dcb6c34ed58a354647573199b01d5f
SHA256bdb3fe32149afaae745ce894ae20b6caf471977717df8449ffcefcf47c9e19c6
SHA5128cb3ad0277f875ff44e18e6f0e2dc3e0b83f5f0a0e224e1e753eb17e2ecc1cedc362275d84ab05c942e91052e4c942e44458f99813adbfea3bfc371436a6f6bf
-
Filesize
2.3MB
MD5735f53bff44ab6f223fc06a87d8a0ff1
SHA1f9d55f0881dcb6c34ed58a354647573199b01d5f
SHA256bdb3fe32149afaae745ce894ae20b6caf471977717df8449ffcefcf47c9e19c6
SHA5128cb3ad0277f875ff44e18e6f0e2dc3e0b83f5f0a0e224e1e753eb17e2ecc1cedc362275d84ab05c942e91052e4c942e44458f99813adbfea3bfc371436a6f6bf