Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
16/11/2023, 13:24
Static task
static1
Behavioral task
behavioral1
Sample
Transferencia.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
Transferencia.exe
Resource
win10v2004-20231023-en
General
-
Target
Transferencia.exe
-
Size
263KB
-
MD5
eab44b2328f9db484cc042970b19a2be
-
SHA1
c38c69f8a7597a06a4b12cd06309aa23af0ce496
-
SHA256
36464f131691f5a812e22d4255377f79a475700185352606586f671b9ab63b66
-
SHA512
5793c049bbb25131725e33e09f6247fa056c64ef0d2bd5e4d643cb2b809b9767aa95bf9d421db9fe960cbf1e408c410a8c43faabf09fc1cc218c56057173a763
-
SSDEEP
6144:9T4Dth1R6LFzFktPQnmzpE7HBCKRx69ChHjZ9zh9Amq8:9Ti1btIIpELBCKRx6eHjZ93AmN
Malware Config
Signatures
-
Loads dropped DLL 5 IoCs
pid Process 3276 Transferencia.exe 3276 Transferencia.exe 3276 Transferencia.exe 3276 Transferencia.exe 3276 Transferencia.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 4876 Transferencia.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 3276 Transferencia.exe 4876 Transferencia.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3276 set thread context of 4876 3276 Transferencia.exe 108 PID 4876 set thread context of 3220 4876 Transferencia.exe 49 PID 4876 set thread context of 3920 4876 Transferencia.exe 110 PID 3920 set thread context of 3220 3920 bitsadmin.exe 49 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \Registry\User\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 bitsadmin.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 4876 Transferencia.exe 4876 Transferencia.exe 4876 Transferencia.exe 4876 Transferencia.exe 4876 Transferencia.exe 4876 Transferencia.exe 4876 Transferencia.exe 4876 Transferencia.exe 4876 Transferencia.exe 4876 Transferencia.exe 4876 Transferencia.exe 4876 Transferencia.exe 4876 Transferencia.exe 4876 Transferencia.exe 4876 Transferencia.exe 4876 Transferencia.exe 3920 bitsadmin.exe 3920 bitsadmin.exe 3920 bitsadmin.exe 3920 bitsadmin.exe 3920 bitsadmin.exe 3920 bitsadmin.exe 3920 bitsadmin.exe 3920 bitsadmin.exe 3920 bitsadmin.exe 3920 bitsadmin.exe 3920 bitsadmin.exe 3920 bitsadmin.exe 3920 bitsadmin.exe 3920 bitsadmin.exe -
Suspicious behavior: MapViewOfSection 8 IoCs
pid Process 3276 Transferencia.exe 4876 Transferencia.exe 3220 Explorer.EXE 3220 Explorer.EXE 3920 bitsadmin.exe 3920 bitsadmin.exe 3920 bitsadmin.exe 3920 bitsadmin.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3276 wrote to memory of 4876 3276 Transferencia.exe 108 PID 3276 wrote to memory of 4876 3276 Transferencia.exe 108 PID 3276 wrote to memory of 4876 3276 Transferencia.exe 108 PID 3276 wrote to memory of 4876 3276 Transferencia.exe 108 PID 3276 wrote to memory of 4876 3276 Transferencia.exe 108 PID 3220 wrote to memory of 3920 3220 Explorer.EXE 110 PID 3220 wrote to memory of 3920 3220 Explorer.EXE 110 PID 3220 wrote to memory of 3920 3220 Explorer.EXE 110 PID 3920 wrote to memory of 5052 3920 bitsadmin.exe 111 PID 3920 wrote to memory of 5052 3920 bitsadmin.exe 111 PID 3920 wrote to memory of 5052 3920 bitsadmin.exe 111
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3220 -
C:\Users\Admin\AppData\Local\Temp\Transferencia.exe"C:\Users\Admin\AppData\Local\Temp\Transferencia.exe"2⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3276 -
C:\Users\Admin\AppData\Local\Temp\Transferencia.exe"C:\Users\Admin\AppData\Local\Temp\Transferencia.exe"3⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4876
-
-
-
C:\Windows\SysWOW64\bitsadmin.exe"C:\Windows\SysWOW64\bitsadmin.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:5052
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD508de81a4584f5201086f57a7a93ed83b
SHA1266a6ecc8fb7dca115e6915cd75e2595816841a8
SHA2564883cd4231744be2dca4433ef62824b7957a3c16be54f8526270402d9413ebe6
SHA512b72e7cea5ce1f4dc64e65a1f683a3ef9e3fa2dc45cf421f569eb461f1fdcc0caf4ff62a872e62b400579f567c6ff9fc3c2e6e020cdca89d96015502c803a09b9
-
Filesize
5KB
MD508de81a4584f5201086f57a7a93ed83b
SHA1266a6ecc8fb7dca115e6915cd75e2595816841a8
SHA2564883cd4231744be2dca4433ef62824b7957a3c16be54f8526270402d9413ebe6
SHA512b72e7cea5ce1f4dc64e65a1f683a3ef9e3fa2dc45cf421f569eb461f1fdcc0caf4ff62a872e62b400579f567c6ff9fc3c2e6e020cdca89d96015502c803a09b9
-
Filesize
5KB
MD508de81a4584f5201086f57a7a93ed83b
SHA1266a6ecc8fb7dca115e6915cd75e2595816841a8
SHA2564883cd4231744be2dca4433ef62824b7957a3c16be54f8526270402d9413ebe6
SHA512b72e7cea5ce1f4dc64e65a1f683a3ef9e3fa2dc45cf421f569eb461f1fdcc0caf4ff62a872e62b400579f567c6ff9fc3c2e6e020cdca89d96015502c803a09b9
-
Filesize
5KB
MD508de81a4584f5201086f57a7a93ed83b
SHA1266a6ecc8fb7dca115e6915cd75e2595816841a8
SHA2564883cd4231744be2dca4433ef62824b7957a3c16be54f8526270402d9413ebe6
SHA512b72e7cea5ce1f4dc64e65a1f683a3ef9e3fa2dc45cf421f569eb461f1fdcc0caf4ff62a872e62b400579f567c6ff9fc3c2e6e020cdca89d96015502c803a09b9
-
Filesize
5KB
MD508de81a4584f5201086f57a7a93ed83b
SHA1266a6ecc8fb7dca115e6915cd75e2595816841a8
SHA2564883cd4231744be2dca4433ef62824b7957a3c16be54f8526270402d9413ebe6
SHA512b72e7cea5ce1f4dc64e65a1f683a3ef9e3fa2dc45cf421f569eb461f1fdcc0caf4ff62a872e62b400579f567c6ff9fc3c2e6e020cdca89d96015502c803a09b9
-
Filesize
12KB
MD56e55a6e7c3fdbd244042eb15cb1ec739
SHA1070ea80e2192abc42f358d47b276990b5fa285a9
SHA256acf90ab6f4edc687e94aaf604d05e16e6cfb5e35873783b50c66f307a35c6506
SHA5122d504b74da38edc967e3859733a2a9cacd885db82f0ca69bfb66872e882707314c54238344d45945dc98bae85772aceef71a741787922d640627d3c8ae8f1c35