Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
31/10/2023, 14:18
Behavioral task
behavioral1
Sample
365e75fab984adf085f70be41d98f76f2fbb1ea41327100e3449c2ffd4229cef.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
365e75fab984adf085f70be41d98f76f2fbb1ea41327100e3449c2ffd4229cef.exe
Resource
win10v2004-20231023-en
General
-
Target
365e75fab984adf085f70be41d98f76f2fbb1ea41327100e3449c2ffd4229cef.exe
-
Size
1.8MB
-
MD5
2b6d1bad2c04c4883d7429a197e67666
-
SHA1
817c80631bf584bb18a63d45a24f26cea3ad11ad
-
SHA256
365e75fab984adf085f70be41d98f76f2fbb1ea41327100e3449c2ffd4229cef
-
SHA512
449f087e93609a30d6d45bee35962e23013e8d769f5419a31ee14be1e757bf97924376d36de0d9a4506f07df6adb9e07e79bcf7e95938bb478d30afdc55362e7
-
SSDEEP
49152:Jxq1vu5zkd1XqmwUdiviDGAHwzWwWGODtY:Jxq6k6vfWfZ2
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3892-0-0x0000000000400000-0x0000000000B37000-memory.dmp upx behavioral2/memory/3892-15-0x0000000000400000-0x0000000000B37000-memory.dmp upx behavioral2/memory/3892-16-0x0000000000400000-0x0000000000B37000-memory.dmp upx behavioral2/memory/3892-26-0x0000000000400000-0x0000000000B37000-memory.dmp upx behavioral2/memory/3892-39-0x0000000000400000-0x0000000000B37000-memory.dmp upx behavioral2/memory/3892-74-0x0000000000400000-0x0000000000B37000-memory.dmp upx behavioral2/memory/3892-91-0x0000000000400000-0x0000000000B37000-memory.dmp upx behavioral2/memory/3892-112-0x0000000000400000-0x0000000000B37000-memory.dmp upx behavioral2/memory/3892-133-0x0000000000400000-0x0000000000B37000-memory.dmp upx behavioral2/memory/3892-150-0x0000000000400000-0x0000000000B37000-memory.dmp upx behavioral2/memory/3892-171-0x0000000000400000-0x0000000000B37000-memory.dmp upx behavioral2/memory/3892-192-0x0000000000400000-0x0000000000B37000-memory.dmp upx behavioral2/memory/3892-209-0x0000000000400000-0x0000000000B37000-memory.dmp upx behavioral2/memory/3892-230-0x0000000000400000-0x0000000000B37000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-984744499-3605095035-265325720-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Anchortools Launcher = "C:\\Users\\Admin\\AppData\\Local\\Temp\\365e75fab984adf085f70be41d98f76f2fbb1ea41327100e3449c2ffd4229cef.exe" 365e75fab984adf085f70be41d98f76f2fbb1ea41327100e3449c2ffd4229cef.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3892 365e75fab984adf085f70be41d98f76f2fbb1ea41327100e3449c2ffd4229cef.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\365e75fab984adf085f70be41d98f76f2fbb1ea41327100e3449c2ffd4229cef.log
Filesize116B
MD542c2e665482be7d7b52f08d066db0b76
SHA185a93dd6c44efe6d608009f48b86b8cd5cc47292
SHA256d4f9e082284afdd5169e77fe2809ea468b99031b12b0a785db167162868efb45
SHA512320c88fcf2dde78dadc66c7c67ff7914f5cb6d67e0abea3d830a9561112018e7a2d0c3005fa9e75e92c2863e63765dc26bbe7a310f8d82611a8bd55892a54a78
-
C:\Users\Admin\AppData\Local\Temp\365e75fab984adf085f70be41d98f76f2fbb1ea41327100e3449c2ffd4229cef.log
Filesize2KB
MD5a6e65365355b8eab6358958c3948e9e7
SHA164f5dc2c2ef2478c58a4762be44ef0019dbb7a52
SHA25685a80fababf46d6792dabb82afc6db6099d1346b7ba75fa9f86471381360c451
SHA512f44b8044c277ed183b2a2818e42be205c8f50d775db1424874384d6e9ca5ce28ea0b1356b658ac3e942ec09327685e03be059566eb1c6e814265a900a2997d26
-
C:\Users\Admin\AppData\Local\Temp\365e75fab984adf085f70be41d98f76f2fbb1ea41327100e3449c2ffd4229cef.log
Filesize4KB
MD52bb10666a5b3b7f3d2dc87f7c7682179
SHA1f4479c0c0fd3f9afbf741589e0e5edad26563bb2
SHA256038f666127a52e46094f5b7c9090e21d8f6443d04af59d15aebefab58872dc24
SHA512f2e62a2c0732ecf192e4f156d9b2c250c3069dddb3bc4ab9e64b65900dfcbe2c4ef2538b9708d41f1b843824a6d165f16a4c8ffecc6322a6e5427fd2dab0ac11