Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
131s -
platform
windows10-1703_x64 -
resource
win10-20231020-en -
resource tags
arch:x64arch:x86image:win10-20231020-enlocale:en-usos:windows10-1703-x64system -
submitted
21/10/2023, 23:42
Static task
static1
Behavioral task
behavioral1
Sample
505187c078bfed283af86657268bbfac9cb015ff73173e9e067fd14677759d50.exe
Resource
win10-20231020-en
General
-
Target
505187c078bfed283af86657268bbfac9cb015ff73173e9e067fd14677759d50.exe
-
Size
1.9MB
-
MD5
4424913873574c384b1ce8230f6ed023
-
SHA1
83dadd4fa95618daadc6519a1086fed1111f4dcf
-
SHA256
505187c078bfed283af86657268bbfac9cb015ff73173e9e067fd14677759d50
-
SHA512
681663a27d7da245acc70b7326a485ba2f49d9854da1f8c0156bf89e9229c800697ffe2df34503b15495567896623a1d84f9d241b5ff02184cd885761e3f847c
-
SSDEEP
49152:UJGiK4arZV+ytURiNG1V6gHG29P3Xvz4v2/zLP9pvDS08:UIiK/z1ti1V6gHG29P3/z4v2/XPz8
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 5036 rundll32.exe 4496 rundll32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4668 wrote to memory of 4328 4668 505187c078bfed283af86657268bbfac9cb015ff73173e9e067fd14677759d50.exe 71 PID 4668 wrote to memory of 4328 4668 505187c078bfed283af86657268bbfac9cb015ff73173e9e067fd14677759d50.exe 71 PID 4668 wrote to memory of 4328 4668 505187c078bfed283af86657268bbfac9cb015ff73173e9e067fd14677759d50.exe 71 PID 4328 wrote to memory of 1200 4328 cmd.exe 73 PID 4328 wrote to memory of 1200 4328 cmd.exe 73 PID 4328 wrote to memory of 1200 4328 cmd.exe 73 PID 1200 wrote to memory of 5036 1200 control.exe 74 PID 1200 wrote to memory of 5036 1200 control.exe 74 PID 1200 wrote to memory of 5036 1200 control.exe 74 PID 5036 wrote to memory of 1276 5036 rundll32.exe 75 PID 5036 wrote to memory of 1276 5036 rundll32.exe 75 PID 1276 wrote to memory of 4496 1276 RunDll32.exe 76 PID 1276 wrote to memory of 4496 1276 RunDll32.exe 76 PID 1276 wrote to memory of 4496 1276 RunDll32.exe 76
Processes
-
C:\Users\Admin\AppData\Local\Temp\505187c078bfed283af86657268bbfac9cb015ff73173e9e067fd14677759d50.exe"C:\Users\Admin\AppData\Local\Temp\505187c078bfed283af86657268bbfac9cb015ff73173e9e067fd14677759d50.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c .\T.CMd2⤵
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Windows\SysWOW64\control.execoNTRol.exE "C:\Users\Admin\AppData\Local\Temp\7zSC3268497\IZDGXGWI.l"3⤵
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\7zSC3268497\IZDGXGWI.l"4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\7zSC3268497\IZDGXGWI.l"5⤵
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\7zSC3268497\IZDGXGWI.l"6⤵
- Loads dropped DLL
PID:4496
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5612952c42fa396bc67eae65e6f42fd96
SHA15cf76e0671932548445b44ef9f4590421f126518
SHA25670af95b6b8eb3e2e1581b1afbd7264d70ce7136f0975c904afdcb637a7aadc38
SHA512e717d716381d75df76d9b494a85ccfc7bec392c05a17daf74db236689a83d80dc064f47001e3b84de923e02b2451dae19f71439ae6a03a19ce552279f89bc357
-
Filesize
34B
MD5e437d84fe3f456dce6fe930667c05391
SHA1cdad5a27869958e61b6d3061fe1da009f50ce6c8
SHA256d45f1d919fd4d3a968ee73a3a6ebf7fd86e90d3d17ce744678738f1552722dc5
SHA512fb42ac951156becea1148f2153c31f72217dbdc7d428e4220c9f49e903c4b71d575ba2613d65b3b88b6af6009a08724371680a4f84448a934249b681f60866d0
-
Filesize
1.8MB
MD5612952c42fa396bc67eae65e6f42fd96
SHA15cf76e0671932548445b44ef9f4590421f126518
SHA25670af95b6b8eb3e2e1581b1afbd7264d70ce7136f0975c904afdcb637a7aadc38
SHA512e717d716381d75df76d9b494a85ccfc7bec392c05a17daf74db236689a83d80dc064f47001e3b84de923e02b2451dae19f71439ae6a03a19ce552279f89bc357
-
Filesize
1.8MB
MD5612952c42fa396bc67eae65e6f42fd96
SHA15cf76e0671932548445b44ef9f4590421f126518
SHA25670af95b6b8eb3e2e1581b1afbd7264d70ce7136f0975c904afdcb637a7aadc38
SHA512e717d716381d75df76d9b494a85ccfc7bec392c05a17daf74db236689a83d80dc064f47001e3b84de923e02b2451dae19f71439ae6a03a19ce552279f89bc357