Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    138s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/10/2023, 15:38

General

  • Target

    06d420479278dd8195b2095e5876f09ed0308519ba54e77a9721e792b63c6c6e.exe

  • Size

    11.5MB

  • MD5

    dd9940ea75fecdcd9f259da6725ea0ba

  • SHA1

    50ba4840ba37cc8caf5de8c8bff9fabc6df48e90

  • SHA256

    06d420479278dd8195b2095e5876f09ed0308519ba54e77a9721e792b63c6c6e

  • SHA512

    41b11908f6eebd89ef57be1789cc0530df6dba674a55b99b497c28c3507600841953a72ecb4d9abb475367958ad7a0fa4edb8a515c1eaa210b2e7312ed36d393

  • SSDEEP

    196608:UOkJ6GYjOSBxdkbuoeB84YEKv6K4NzNvZJEF2ntYkm6Vo3tUhC3mMM+Pw:0DSBXkbR4lK6PBvntW73teMnw

Malware Config

Signatures

  • UPX packed file 27 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • VMProtect packed file 3 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\06d420479278dd8195b2095e5876f09ed0308519ba54e77a9721e792b63c6c6e.exe
    "C:\Users\Admin\AppData\Local\Temp\06d420479278dd8195b2095e5876f09ed0308519ba54e77a9721e792b63c6c6e.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:4460

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4460-1-0x0000000002490000-0x0000000002491000-memory.dmp

    Filesize

    4KB

  • memory/4460-0-0x0000000001F70000-0x0000000001F71000-memory.dmp

    Filesize

    4KB

  • memory/4460-3-0x0000000003D90000-0x0000000003D91000-memory.dmp

    Filesize

    4KB

  • memory/4460-2-0x00000000024A0000-0x00000000024A1000-memory.dmp

    Filesize

    4KB

  • memory/4460-6-0x0000000000400000-0x0000000001EB7000-memory.dmp

    Filesize

    26.7MB

  • memory/4460-5-0x0000000003DB0000-0x0000000003DB1000-memory.dmp

    Filesize

    4KB

  • memory/4460-4-0x0000000003DA0000-0x0000000003DA1000-memory.dmp

    Filesize

    4KB

  • memory/4460-7-0x0000000003DC0000-0x0000000003DC1000-memory.dmp

    Filesize

    4KB

  • memory/4460-11-0x0000000003FE0000-0x0000000003FEB000-memory.dmp

    Filesize

    44KB

  • memory/4460-13-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4460-12-0x0000000003FE0000-0x0000000003FEB000-memory.dmp

    Filesize

    44KB

  • memory/4460-14-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4460-16-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4460-15-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4460-19-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4460-22-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4460-24-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4460-26-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4460-28-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4460-31-0x0000000000400000-0x0000000001EB7000-memory.dmp

    Filesize

    26.7MB

  • memory/4460-30-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4460-34-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4460-36-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4460-38-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4460-40-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4460-42-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4460-44-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4460-46-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4460-48-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4460-50-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4460-52-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4460-54-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4460-56-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4460-58-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4460-60-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4460-61-0x0000000004000000-0x0000000004001000-memory.dmp

    Filesize

    4KB

  • memory/4460-62-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4460-63-0x0000000000400000-0x0000000001EB7000-memory.dmp

    Filesize

    26.7MB