Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2023, 15:33
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20231020-en
General
-
Target
file.exe
-
Size
1.3MB
-
MD5
26591460c73aa9739e0b34f948dab9c4
-
SHA1
049fefc36f5f7b74b04e9611b5d0073bffd35f67
-
SHA256
1d36f50fb824abd83c7134b74b669942461cee5e33124cede35d4d5519765734
-
SHA512
d9ee614b766c8ff858bf2f2ce402f8c7726065671acd03a61b0eb57ac7e000a34990bc3ebab6a06d87892699ec3c4b334ddc12b0da9af0cc0e58e6e7b682412f
-
SSDEEP
24576:NmmEs2wqfcRBxJCBEmAMpCOJMbgp2kvB1Pj5R+d3ThJgrU35Zln2i6:8dw/IyPxbgp2iB1Pju3TIrK5Zln2i6
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FANBooster131.lnk file.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MaxLoonaFest131 = "C:\\Users\\Admin\\AppData\\Local\\MaxLoonaFest131\\MaxLoonaFest131.exe" file.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1420 schtasks.exe 3196 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3116 wrote to memory of 1420 3116 file.exe 89 PID 3116 wrote to memory of 1420 3116 file.exe 89 PID 3116 wrote to memory of 1420 3116 file.exe 89 PID 3116 wrote to memory of 3196 3116 file.exe 91 PID 3116 wrote to memory of 3196 3116 file.exe 91 PID 3116 wrote to memory of 3196 3116 file.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 HR" /sc HOURLY /rl HIGHEST2⤵
- Creates scheduled task(s)
PID:1420
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 LG" /sc ONLOGON /rl HIGHEST2⤵
- Creates scheduled task(s)
PID:3196
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD526591460c73aa9739e0b34f948dab9c4
SHA1049fefc36f5f7b74b04e9611b5d0073bffd35f67
SHA2561d36f50fb824abd83c7134b74b669942461cee5e33124cede35d4d5519765734
SHA512d9ee614b766c8ff858bf2f2ce402f8c7726065671acd03a61b0eb57ac7e000a34990bc3ebab6a06d87892699ec3c4b334ddc12b0da9af0cc0e58e6e7b682412f