Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2023, 14:03
Behavioral task
behavioral1
Sample
5ccbd42739c5f083f174a39072f31e5858931d674c13eaf31d203f54729954c9.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
5ccbd42739c5f083f174a39072f31e5858931d674c13eaf31d203f54729954c9.exe
Resource
win10v2004-20231023-en
General
-
Target
5ccbd42739c5f083f174a39072f31e5858931d674c13eaf31d203f54729954c9.exe
-
Size
15.8MB
-
MD5
64b2f2c27841d406f715ba711a503a23
-
SHA1
e319d7ea803bae6de519804596085d0666f120db
-
SHA256
5ccbd42739c5f083f174a39072f31e5858931d674c13eaf31d203f54729954c9
-
SHA512
e6b4ded727c507505be450651307fd05b0f8e6f04677d8f38d2291c4365894ac51150e0ca2f8bb180e96bb4988e545ad29bc52844ca1b1b1817e0869e7071ae8
-
SSDEEP
393216:Wy9yMTErkFpGNv/bkvshHWD+m28PqNacPVx7:WuTErkFpGNsshXQqNaof
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3596-0-0x0000000000400000-0x0000000000C77000-memory.dmp upx behavioral2/memory/3596-1-0x0000000000400000-0x0000000000C77000-memory.dmp upx behavioral2/memory/3596-2-0x0000000000400000-0x0000000000C77000-memory.dmp upx behavioral2/memory/3596-3-0x0000000000400000-0x0000000000C77000-memory.dmp upx behavioral2/memory/3596-4-0x0000000000400000-0x0000000000C77000-memory.dmp upx behavioral2/memory/3596-5-0x0000000000400000-0x0000000000C77000-memory.dmp upx behavioral2/memory/3596-6-0x0000000000400000-0x0000000000C77000-memory.dmp upx behavioral2/memory/3596-7-0x0000000000400000-0x0000000000C77000-memory.dmp upx behavioral2/memory/3596-8-0x0000000000400000-0x0000000000C77000-memory.dmp upx behavioral2/memory/3596-9-0x0000000000400000-0x0000000000C77000-memory.dmp upx behavioral2/memory/3596-10-0x0000000000400000-0x0000000000C77000-memory.dmp upx behavioral2/memory/3596-11-0x0000000000400000-0x0000000000C77000-memory.dmp upx behavioral2/memory/3596-12-0x0000000000400000-0x0000000000C77000-memory.dmp upx behavioral2/memory/3596-13-0x0000000000400000-0x0000000000C77000-memory.dmp upx behavioral2/memory/3596-14-0x0000000000400000-0x0000000000C77000-memory.dmp upx -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: 5ccbd42739c5f083f174a39072f31e5858931d674c13eaf31d203f54729954c9.exe File opened (read-only) \??\M: 5ccbd42739c5f083f174a39072f31e5858931d674c13eaf31d203f54729954c9.exe File opened (read-only) \??\R: 5ccbd42739c5f083f174a39072f31e5858931d674c13eaf31d203f54729954c9.exe File opened (read-only) \??\S: 5ccbd42739c5f083f174a39072f31e5858931d674c13eaf31d203f54729954c9.exe File opened (read-only) \??\Y: 5ccbd42739c5f083f174a39072f31e5858931d674c13eaf31d203f54729954c9.exe File opened (read-only) \??\G: 5ccbd42739c5f083f174a39072f31e5858931d674c13eaf31d203f54729954c9.exe File opened (read-only) \??\L: 5ccbd42739c5f083f174a39072f31e5858931d674c13eaf31d203f54729954c9.exe File opened (read-only) \??\N: 5ccbd42739c5f083f174a39072f31e5858931d674c13eaf31d203f54729954c9.exe File opened (read-only) \??\V: 5ccbd42739c5f083f174a39072f31e5858931d674c13eaf31d203f54729954c9.exe File opened (read-only) \??\U: 5ccbd42739c5f083f174a39072f31e5858931d674c13eaf31d203f54729954c9.exe File opened (read-only) \??\B: 5ccbd42739c5f083f174a39072f31e5858931d674c13eaf31d203f54729954c9.exe File opened (read-only) \??\P: 5ccbd42739c5f083f174a39072f31e5858931d674c13eaf31d203f54729954c9.exe File opened (read-only) \??\Q: 5ccbd42739c5f083f174a39072f31e5858931d674c13eaf31d203f54729954c9.exe File opened (read-only) \??\T: 5ccbd42739c5f083f174a39072f31e5858931d674c13eaf31d203f54729954c9.exe File opened (read-only) \??\K: 5ccbd42739c5f083f174a39072f31e5858931d674c13eaf31d203f54729954c9.exe File opened (read-only) \??\O: 5ccbd42739c5f083f174a39072f31e5858931d674c13eaf31d203f54729954c9.exe File opened (read-only) \??\W: 5ccbd42739c5f083f174a39072f31e5858931d674c13eaf31d203f54729954c9.exe File opened (read-only) \??\X: 5ccbd42739c5f083f174a39072f31e5858931d674c13eaf31d203f54729954c9.exe File opened (read-only) \??\A: 5ccbd42739c5f083f174a39072f31e5858931d674c13eaf31d203f54729954c9.exe File opened (read-only) \??\E: 5ccbd42739c5f083f174a39072f31e5858931d674c13eaf31d203f54729954c9.exe File opened (read-only) \??\I: 5ccbd42739c5f083f174a39072f31e5858931d674c13eaf31d203f54729954c9.exe File opened (read-only) \??\J: 5ccbd42739c5f083f174a39072f31e5858931d674c13eaf31d203f54729954c9.exe File opened (read-only) \??\Z: 5ccbd42739c5f083f174a39072f31e5858931d674c13eaf31d203f54729954c9.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3596 5ccbd42739c5f083f174a39072f31e5858931d674c13eaf31d203f54729954c9.exe 3596 5ccbd42739c5f083f174a39072f31e5858931d674c13eaf31d203f54729954c9.exe 3596 5ccbd42739c5f083f174a39072f31e5858931d674c13eaf31d203f54729954c9.exe 3596 5ccbd42739c5f083f174a39072f31e5858931d674c13eaf31d203f54729954c9.exe 3596 5ccbd42739c5f083f174a39072f31e5858931d674c13eaf31d203f54729954c9.exe 3596 5ccbd42739c5f083f174a39072f31e5858931d674c13eaf31d203f54729954c9.exe