Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
02/11/2023, 04:01
Static task
static1
Behavioral task
behavioral1
Sample
85a7164cce8ff898de475374c2c34ad06ae130550c615b0f364315879dca4d36.exe
Resource
win10v2004-20231023-en
General
-
Target
85a7164cce8ff898de475374c2c34ad06ae130550c615b0f364315879dca4d36.exe
-
Size
5.7MB
-
MD5
46dc659df18024c5b34a54464e5ca08b
-
SHA1
ffea6c575b4a6fa35c6e64a80449dbb2d018ccc9
-
SHA256
85a7164cce8ff898de475374c2c34ad06ae130550c615b0f364315879dca4d36
-
SHA512
ad3884ff034c5fcc8230c7f6aeb35c9a004a4e81cf2f232e7209c1f219fe74ad1952b93a4cc1b97857351fab40ba3420fa03e29de77029f22455c6bae40d5374
-
SSDEEP
98304:IitU3e9bLl9HJ2raNZHyUMupQyqMkFRwqzW7Z3Dwdg7KehlwyamQpuq61L2jDgsd:RtKGzHJ2rGyBsUfwqqV3sgBhyzmQp9Es
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2420 is-78AFH.tmp 972 IsoBuster_1121.exe 1528 IsoBuster_1121.exe -
Loads dropped DLL 1 IoCs
pid Process 2420 is-78AFH.tmp -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 51.159.66.125 -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 34 IoCs
description ioc Process File created C:\Program Files (x86)\Smart Projects\IsoBuster\is-O217H.tmp is-78AFH.tmp File created C:\Program Files (x86)\Smart Projects\IsoBuster\Lang\is-GU1FK.tmp is-78AFH.tmp File created C:\Program Files (x86)\Smart Projects\IsoBuster\Lang\is-GVEDG.tmp is-78AFH.tmp File created C:\Program Files (x86)\Smart Projects\IsoBuster\Lang\is-DACCK.tmp is-78AFH.tmp File created C:\Program Files (x86)\Smart Projects\IsoBuster\Lang\is-C8R49.tmp is-78AFH.tmp File created C:\Program Files (x86)\Smart Projects\IsoBuster\Plugins\is-0EBES.tmp is-78AFH.tmp File opened for modification C:\Program Files (x86)\Smart Projects\IsoBuster\unins000.dat is-78AFH.tmp File created C:\Program Files (x86)\Smart Projects\IsoBuster\Lang\is-K0NTF.tmp is-78AFH.tmp File created C:\Program Files (x86)\Smart Projects\IsoBuster\Lang\is-G187E.tmp is-78AFH.tmp File created C:\Program Files (x86)\Smart Projects\IsoBuster\Help\is-A9N8F.tmp is-78AFH.tmp File created C:\Program Files (x86)\Smart Projects\IsoBuster\Plugins\is-J72SH.tmp is-78AFH.tmp File created C:\Program Files (x86)\Smart Projects\IsoBuster\Lang\is-V6VLH.tmp is-78AFH.tmp File created C:\Program Files (x86)\Smart Projects\IsoBuster\Lang\is-GQJP9.tmp is-78AFH.tmp File created C:\Program Files (x86)\Smart Projects\IsoBuster\is-I9LK8.tmp is-78AFH.tmp File created C:\Program Files (x86)\Smart Projects\IsoBuster\unins000.dat is-78AFH.tmp File created C:\Program Files (x86)\Smart Projects\IsoBuster\Lang\is-LAENP.tmp is-78AFH.tmp File created C:\Program Files (x86)\Smart Projects\IsoBuster\Lang\is-FH2VC.tmp is-78AFH.tmp File created C:\Program Files (x86)\Smart Projects\IsoBuster\Lang\is-2F5A8.tmp is-78AFH.tmp File created C:\Program Files (x86)\Smart Projects\IsoBuster\Lang\is-TPHQN.tmp is-78AFH.tmp File created C:\Program Files (x86)\Smart Projects\IsoBuster\Lang\is-DJL92.tmp is-78AFH.tmp File created C:\Program Files (x86)\Smart Projects\IsoBuster\Lang\is-IILK4.tmp is-78AFH.tmp File created C:\Program Files (x86)\Smart Projects\IsoBuster\Lang\is-3S1JA.tmp is-78AFH.tmp File created C:\Program Files (x86)\Smart Projects\IsoBuster\Online\is-C7845.tmp is-78AFH.tmp File opened for modification C:\Program Files (x86)\Smart Projects\IsoBuster\IsoBuster_1121.exe is-78AFH.tmp File created C:\Program Files (x86)\Smart Projects\IsoBuster\Lang\is-37902.tmp is-78AFH.tmp File created C:\Program Files (x86)\Smart Projects\IsoBuster\Lang\is-D0FD1.tmp is-78AFH.tmp File created C:\Program Files (x86)\Smart Projects\IsoBuster\Lang\is-6H3QK.tmp is-78AFH.tmp File created C:\Program Files (x86)\Smart Projects\IsoBuster\Online\is-8OOK0.tmp is-78AFH.tmp File created C:\Program Files (x86)\Smart Projects\IsoBuster\Plugins\is-LAL90.tmp is-78AFH.tmp File created C:\Program Files (x86)\Smart Projects\IsoBuster\Lang\is-MK7CO.tmp is-78AFH.tmp File created C:\Program Files (x86)\Smart Projects\IsoBuster\Lang\is-EMQO8.tmp is-78AFH.tmp File created C:\Program Files (x86)\Smart Projects\IsoBuster\Plugins\is-LQAI4.tmp is-78AFH.tmp File created C:\Program Files (x86)\Smart Projects\IsoBuster\Lang\is-NC0K0.tmp is-78AFH.tmp File created C:\Program Files (x86)\Smart Projects\IsoBuster\Lang\is-UM3QG.tmp is-78AFH.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4576 wrote to memory of 2420 4576 85a7164cce8ff898de475374c2c34ad06ae130550c615b0f364315879dca4d36.exe 91 PID 4576 wrote to memory of 2420 4576 85a7164cce8ff898de475374c2c34ad06ae130550c615b0f364315879dca4d36.exe 91 PID 4576 wrote to memory of 2420 4576 85a7164cce8ff898de475374c2c34ad06ae130550c615b0f364315879dca4d36.exe 91 PID 2420 wrote to memory of 2264 2420 is-78AFH.tmp 94 PID 2420 wrote to memory of 2264 2420 is-78AFH.tmp 94 PID 2420 wrote to memory of 2264 2420 is-78AFH.tmp 94 PID 2420 wrote to memory of 972 2420 is-78AFH.tmp 95 PID 2420 wrote to memory of 972 2420 is-78AFH.tmp 95 PID 2420 wrote to memory of 972 2420 is-78AFH.tmp 95 PID 2264 wrote to memory of 4656 2264 net.exe 97 PID 2264 wrote to memory of 4656 2264 net.exe 97 PID 2264 wrote to memory of 4656 2264 net.exe 97 PID 2420 wrote to memory of 1528 2420 is-78AFH.tmp 98 PID 2420 wrote to memory of 1528 2420 is-78AFH.tmp 98 PID 2420 wrote to memory of 1528 2420 is-78AFH.tmp 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\85a7164cce8ff898de475374c2c34ad06ae130550c615b0f364315879dca4d36.exe"C:\Users\Admin\AppData\Local\Temp\85a7164cce8ff898de475374c2c34ad06ae130550c615b0f364315879dca4d36.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Users\Admin\AppData\Local\Temp\is-E5BOF.tmp\is-78AFH.tmp"C:\Users\Admin\AppData\Local\Temp\is-E5BOF.tmp\is-78AFH.tmp" /SL4 $F0044 "C:\Users\Admin\AppData\Local\Temp\85a7164cce8ff898de475374c2c34ad06ae130550c615b0f364315879dca4d36.exe" 5662231 1418242⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" helpmsg 23⤵
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 helpmsg 24⤵PID:4656
-
-
-
C:\Program Files (x86)\Smart Projects\IsoBuster\IsoBuster_1121.exe"C:\Program Files (x86)\Smart Projects\IsoBuster\IsoBuster_1121.exe" -i3⤵
- Executes dropped EXE
PID:972
-
-
C:\Program Files (x86)\Smart Projects\IsoBuster\IsoBuster_1121.exe"C:\Program Files (x86)\Smart Projects\IsoBuster\IsoBuster_1121.exe" -s3⤵
- Executes dropped EXE
PID:1528
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.5MB
MD51fa8402cbb0152b434a7809bdc38179f
SHA142c229b58ad7213df06a8578c02cc7d5c2cec856
SHA2563297f3421175a5704e4c81e3b3f26ca4fc2cf9c411fe43a45a7140db67b4d785
SHA512864c708c79e2d216e32dd443ebc34c18a7c5d330ecf3c266a68ce7e1cdf983e521debb1175d2d0a2dced7a9acd44d9d8122a1467f332673e54c5784c2d726dcb
-
Filesize
4.5MB
MD51fa8402cbb0152b434a7809bdc38179f
SHA142c229b58ad7213df06a8578c02cc7d5c2cec856
SHA2563297f3421175a5704e4c81e3b3f26ca4fc2cf9c411fe43a45a7140db67b4d785
SHA512864c708c79e2d216e32dd443ebc34c18a7c5d330ecf3c266a68ce7e1cdf983e521debb1175d2d0a2dced7a9acd44d9d8122a1467f332673e54c5784c2d726dcb
-
Filesize
4.5MB
MD51fa8402cbb0152b434a7809bdc38179f
SHA142c229b58ad7213df06a8578c02cc7d5c2cec856
SHA2563297f3421175a5704e4c81e3b3f26ca4fc2cf9c411fe43a45a7140db67b4d785
SHA512864c708c79e2d216e32dd443ebc34c18a7c5d330ecf3c266a68ce7e1cdf983e521debb1175d2d0a2dced7a9acd44d9d8122a1467f332673e54c5784c2d726dcb
-
Filesize
642KB
MD5e57693101a63b1f934f462bc7a2ef093
SHA12748ea8c66b980f14c9ce36c1c3061e690cf3ce7
SHA25671267ff94c9fc72cbffaeed3bc2f33cef1eeb1887c29c574d7f26595d1a6235f
SHA5123dcda686a85b19a9c7b4c96d132e90ed43c7df13ce9456beb2b88c278d8068cc3abcbfe25b1607c7b8281d276efb24809730f352927b326254f3208cbdf54a3e
-
Filesize
642KB
MD5e57693101a63b1f934f462bc7a2ef093
SHA12748ea8c66b980f14c9ce36c1c3061e690cf3ce7
SHA25671267ff94c9fc72cbffaeed3bc2f33cef1eeb1887c29c574d7f26595d1a6235f
SHA5123dcda686a85b19a9c7b4c96d132e90ed43c7df13ce9456beb2b88c278d8068cc3abcbfe25b1607c7b8281d276efb24809730f352927b326254f3208cbdf54a3e
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63