Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
23/11/2023, 11:48
Static task
static1
Behavioral task
behavioral1
Sample
2.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
2.exe
Resource
win10v2004-20231023-en
General
-
Target
2.exe
-
Size
525KB
-
MD5
91fbfad8dd2f4e1e58edce52ac0e2d93
-
SHA1
6b2205d2d86131d66dd27eb59a2465e4e5560b02
-
SHA256
04838640b4ef54b164d69d2117c6b2b8c59a426cd46f33380d99c298fd636afa
-
SHA512
46fcfb66c4b76b9307b17272aa0f90d0096292f54b02d26a5f714165f77987658b78e352e712b188cb786fc89ab1c59da617ec104f80e041f60bf13f4385a556
-
SSDEEP
12288:UMwwkS7HrstA/a2Ew628F6SeGjtvP10jhHJ72MYUdklA:UMwwpN/BEw628F6SewtvP1Y726dUA
Malware Config
Signatures
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Loads dropped DLL 9 IoCs
pid Process 4916 2.exe 4916 2.exe 4916 2.exe 4916 2.exe 4916 2.exe 4916 2.exe 4916 2.exe 4916 2.exe 4916 2.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 4968 2.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4916 2.exe 4968 2.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4916 set thread context of 4968 4916 2.exe 95 PID 4968 set thread context of 3112 4968 2.exe 69 PID 4968 set thread context of 5076 4968 2.exe 96 PID 5076 set thread context of 3112 5076 SearchIndexer.exe 69 -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\pneumodynamic\Crews\melanorrhoea\brnene\tombolaernes.cul 2.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\resources\beaner\Krydsogtvrsopgavers\blodstyrtnings\Sovevognskonduktren\svenskekyst\enegngernes\kaldendes\periboli.Tor38 2.exe File opened for modification C:\Windows\resources\0409\weichselwood\Ressource\providoring\linjevogterne\sexisms\Enogtyvendedel\matias\afstraffe.opf 2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \Registry\User\S-1-5-21-2231940048-779848787-2990559741-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 SearchIndexer.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 4968 2.exe 4968 2.exe 4968 2.exe 4968 2.exe 4968 2.exe 4968 2.exe 4968 2.exe 4968 2.exe 4968 2.exe 4968 2.exe 4968 2.exe 4968 2.exe 4968 2.exe 4968 2.exe 4968 2.exe 4968 2.exe 5076 SearchIndexer.exe 5076 SearchIndexer.exe 5076 SearchIndexer.exe 5076 SearchIndexer.exe 5076 SearchIndexer.exe 5076 SearchIndexer.exe 5076 SearchIndexer.exe 5076 SearchIndexer.exe 5076 SearchIndexer.exe 5076 SearchIndexer.exe 5076 SearchIndexer.exe 5076 SearchIndexer.exe 5076 SearchIndexer.exe 5076 SearchIndexer.exe 5076 SearchIndexer.exe 5076 SearchIndexer.exe -
Suspicious behavior: MapViewOfSection 8 IoCs
pid Process 4916 2.exe 4968 2.exe 3112 Explorer.EXE 3112 Explorer.EXE 5076 SearchIndexer.exe 5076 SearchIndexer.exe 5076 SearchIndexer.exe 5076 SearchIndexer.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3112 Explorer.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4916 wrote to memory of 4968 4916 2.exe 95 PID 4916 wrote to memory of 4968 4916 2.exe 95 PID 4916 wrote to memory of 4968 4916 2.exe 95 PID 4916 wrote to memory of 4968 4916 2.exe 95 PID 4916 wrote to memory of 4968 4916 2.exe 95 PID 3112 wrote to memory of 5076 3112 Explorer.EXE 96 PID 3112 wrote to memory of 5076 3112 Explorer.EXE 96 PID 3112 wrote to memory of 5076 3112 Explorer.EXE 96 PID 5076 wrote to memory of 3184 5076 SearchIndexer.exe 97 PID 5076 wrote to memory of 3184 5076 SearchIndexer.exe 97 PID 5076 wrote to memory of 3184 5076 SearchIndexer.exe 97
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Users\Admin\AppData\Local\Temp\2.exe"C:\Users\Admin\AppData\Local\Temp\2.exe"2⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Users\Admin\AppData\Local\Temp\2.exe"C:\Users\Admin\AppData\Local\Temp\2.exe"3⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4968
-
-
-
C:\Windows\SysWOW64\SearchIndexer.exe"C:\Windows\SysWOW64\SearchIndexer.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:3184
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5014a3be4a7c1ccb217916dbf4f222bd1
SHA19b4c41eb0e84886beb5591d8357155e27f9c68ed
SHA25609acfc5ee34a1dfa1af3a9d34f00c3b1327b56641feebd536e13752349c08ac8
SHA5120f3d1bf548e29a136150b699665a3f22c6ea2821701737363fa2920b51c391d735f1eae92dea8af655e7d07304bd3d06e4aff3f5a82fa22bcf5d1690013eb922
-
Filesize
5KB
MD5014a3be4a7c1ccb217916dbf4f222bd1
SHA19b4c41eb0e84886beb5591d8357155e27f9c68ed
SHA25609acfc5ee34a1dfa1af3a9d34f00c3b1327b56641feebd536e13752349c08ac8
SHA5120f3d1bf548e29a136150b699665a3f22c6ea2821701737363fa2920b51c391d735f1eae92dea8af655e7d07304bd3d06e4aff3f5a82fa22bcf5d1690013eb922
-
Filesize
5KB
MD5014a3be4a7c1ccb217916dbf4f222bd1
SHA19b4c41eb0e84886beb5591d8357155e27f9c68ed
SHA25609acfc5ee34a1dfa1af3a9d34f00c3b1327b56641feebd536e13752349c08ac8
SHA5120f3d1bf548e29a136150b699665a3f22c6ea2821701737363fa2920b51c391d735f1eae92dea8af655e7d07304bd3d06e4aff3f5a82fa22bcf5d1690013eb922
-
Filesize
5KB
MD5014a3be4a7c1ccb217916dbf4f222bd1
SHA19b4c41eb0e84886beb5591d8357155e27f9c68ed
SHA25609acfc5ee34a1dfa1af3a9d34f00c3b1327b56641feebd536e13752349c08ac8
SHA5120f3d1bf548e29a136150b699665a3f22c6ea2821701737363fa2920b51c391d735f1eae92dea8af655e7d07304bd3d06e4aff3f5a82fa22bcf5d1690013eb922
-
Filesize
5KB
MD5014a3be4a7c1ccb217916dbf4f222bd1
SHA19b4c41eb0e84886beb5591d8357155e27f9c68ed
SHA25609acfc5ee34a1dfa1af3a9d34f00c3b1327b56641feebd536e13752349c08ac8
SHA5120f3d1bf548e29a136150b699665a3f22c6ea2821701737363fa2920b51c391d735f1eae92dea8af655e7d07304bd3d06e4aff3f5a82fa22bcf5d1690013eb922
-
Filesize
12KB
MD5564bb0373067e1785cba7e4c24aab4bf
SHA17c9416a01d821b10b2eef97b80899d24014d6fc1
SHA2567a9ddee34562cd3703f1502b5c70e99cd5bba15de2b6845a3555033d7f6cb2a5
SHA51222c61a323cb9293d7ec5c7e7e60674d0e2f7b29d55be25eb3c128ea2cd7440a1400cee17c43896b996278007c0d247f331a9b8964e3a40a0eb1404a9596c4472
-
Filesize
4KB
MD598ff85b635d9114a9f6a0cd7b9b649d0
SHA17a51b13aa86a445a2161fa1a567cdaecaa5c97c4
SHA256933f93a30ce44df96cbc4ac0b56a8b02ee01da27e4ea665d1d846357a8fca8de
SHA512562342532c437236d56054278d27195e5f8c7e59911fc006964149fc0420b1f9963d72a71ebf1cd3dfee42d991a4049a382f7e669863504c16f0fe7097a07a0a
-
Filesize
9KB
MD548f3e7860e1de2b4e63ec744a5e9582a
SHA1420c64d802a637c75a53efc8f748e1aede3d6dc6
SHA2566bf9cccd8a600f4d442efe201e8c07b49605ba35f49a4b3ab22fa2641748e156
SHA51228716ddea580eeb23d93d1ff6ea0cf79a725e13c8f8a17ec9dfacb1fe29c7981ad84c03aed05663adc52365d63d19ec2f366762d1c685e3a9d93037570c3c583
-
Filesize
9KB
MD548f3e7860e1de2b4e63ec744a5e9582a
SHA1420c64d802a637c75a53efc8f748e1aede3d6dc6
SHA2566bf9cccd8a600f4d442efe201e8c07b49605ba35f49a4b3ab22fa2641748e156
SHA51228716ddea580eeb23d93d1ff6ea0cf79a725e13c8f8a17ec9dfacb1fe29c7981ad84c03aed05663adc52365d63d19ec2f366762d1c685e3a9d93037570c3c583
-
Filesize
9KB
MD548f3e7860e1de2b4e63ec744a5e9582a
SHA1420c64d802a637c75a53efc8f748e1aede3d6dc6
SHA2566bf9cccd8a600f4d442efe201e8c07b49605ba35f49a4b3ab22fa2641748e156
SHA51228716ddea580eeb23d93d1ff6ea0cf79a725e13c8f8a17ec9dfacb1fe29c7981ad84c03aed05663adc52365d63d19ec2f366762d1c685e3a9d93037570c3c583
-
Filesize
7KB
MD54c77a65bb121bb7f2910c1fa3cb38337
SHA194531e3c6255125c1a85653174737d275bc35838
SHA2565e66489393f159aa0fd30b630bb345d03418e9324e7d834b2e4195865a637cfe
SHA512df50eadf312469c56996c67007d31b85d00e91a4f40355e786536fc0336ac9c2fd8ad9df6e65ab390cc6f031aca28c92212ea23cc40eb600b82a63be3b5b8c04