Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
185s -
max time network
259s -
platform
windows10-1703_x64 -
resource
win10-20231023-en -
resource tags
arch:x64arch:x86image:win10-20231023-enlocale:en-usos:windows10-1703-x64system -
submitted
03/11/2023, 04:09
Behavioral task
behavioral1
Sample
c6185a23c51b8ac77e6c1bdf2cd4a8d39b02af8b8027d4162cf9766d19cf87c8.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
c6185a23c51b8ac77e6c1bdf2cd4a8d39b02af8b8027d4162cf9766d19cf87c8.exe
Resource
win10-20231023-en
General
-
Target
c6185a23c51b8ac77e6c1bdf2cd4a8d39b02af8b8027d4162cf9766d19cf87c8.exe
-
Size
4.8MB
-
MD5
d9ce98a0b0029d26876ac86409bac27e
-
SHA1
7dc9f3ac41b40b5ed78a42273f3f5f95d2d367c3
-
SHA256
c6185a23c51b8ac77e6c1bdf2cd4a8d39b02af8b8027d4162cf9766d19cf87c8
-
SHA512
29c81caa093ddf7344e3a647bc6fb76e341de923699111e190e94df9ae1660737237f541c7474157ababc5f33aca8eadf00b54180c6820e1173a399b9ed54eb7
-
SSDEEP
98304:T/kRk50qK5N7jdM2gOpqufwX9h+3dcWUWZJziS1hZUZyeYOth3fOCQb9GK1/49s:bokO9jdMxOUUwWdiWmS+JuZGKJ49
Malware Config
Signatures
-
PrivateLoader 3 IoCs
PrivateLoader.
resource yara_rule behavioral2/memory/3888-1-0x00000000008F0000-0x00000000010AB000-memory.dmp win_privateloader behavioral2/memory/3888-2-0x00000000008F0000-0x00000000010AB000-memory.dmp win_privateloader behavioral2/memory/3888-6-0x00000000008F0000-0x00000000010AB000-memory.dmp win_privateloader -
resource yara_rule behavioral2/memory/3888-1-0x00000000008F0000-0x00000000010AB000-memory.dmp vmprotect behavioral2/memory/3888-2-0x00000000008F0000-0x00000000010AB000-memory.dmp vmprotect behavioral2/memory/3888-6-0x00000000008F0000-0x00000000010AB000-memory.dmp vmprotect -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 9 ipinfo.io 10 ipinfo.io -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe c6185a23c51b8ac77e6c1bdf2cd4a8d39b02af8b8027d4162cf9766d19cf87c8.exe File opened for modification C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe c6185a23c51b8ac77e6c1bdf2cd4a8d39b02af8b8027d4162cf9766d19cf87c8.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2132 3888 WerFault.exe 70 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3888 c6185a23c51b8ac77e6c1bdf2cd4a8d39b02af8b8027d4162cf9766d19cf87c8.exe 3888 c6185a23c51b8ac77e6c1bdf2cd4a8d39b02af8b8027d4162cf9766d19cf87c8.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c6185a23c51b8ac77e6c1bdf2cd4a8d39b02af8b8027d4162cf9766d19cf87c8.exe"C:\Users\Admin\AppData\Local\Temp\c6185a23c51b8ac77e6c1bdf2cd4a8d39b02af8b8027d4162cf9766d19cf87c8.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:3888 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3888 -s 13002⤵
- Program crash
PID:2132
-