Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
25/11/2023, 09:06
Static task
static1
Behavioral task
behavioral1
Sample
fewvc.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
fewvc.exe
Resource
win10v2004-20231023-en
General
-
Target
fewvc.exe
-
Size
2.4MB
-
MD5
7f133f61ef64cf914cbe0996ee79f85a
-
SHA1
4320f2f9f0aac2051746d9ddbae1ce22500c8af7
-
SHA256
20c157bf9063d14ab2f9fad5145f0c3b2be477244f8e41b9000aa6c7a3d35325
-
SHA512
0c0fab19ae73338dd7d30e153c71640ec274dc2d3de1c98aacc49e5f7ded1bca4e73befb17aeb5b24827647cc13bbe0357fa9b00c8279e0a14b164fd4cfd81a3
-
SSDEEP
49152:WA+x6nPIDKFLlhIzMHBd0CFwk84djYfyZ8ZUIphw5vsJJ:W5x6ng+0CCk84808l8sJ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 5012 9t.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\9t.exe fewvc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5012 9t.exe 5012 9t.exe 5012 9t.exe 5012 9t.exe 5012 9t.exe 5012 9t.exe 5012 9t.exe 5012 9t.exe 5012 9t.exe 5012 9t.exe 5012 9t.exe 5012 9t.exe 5012 9t.exe 5012 9t.exe 5012 9t.exe 5012 9t.exe 5012 9t.exe 5012 9t.exe 5012 9t.exe 5012 9t.exe 5012 9t.exe 5012 9t.exe 5012 9t.exe 5012 9t.exe 5012 9t.exe 5012 9t.exe 5012 9t.exe 5012 9t.exe 5012 9t.exe 5012 9t.exe 5012 9t.exe 5012 9t.exe 5012 9t.exe 5012 9t.exe 5012 9t.exe 5012 9t.exe 5012 9t.exe 5012 9t.exe 5012 9t.exe 5012 9t.exe 5012 9t.exe 5012 9t.exe 5012 9t.exe 5012 9t.exe 5012 9t.exe 5012 9t.exe 5012 9t.exe 5012 9t.exe 5012 9t.exe 5012 9t.exe 5012 9t.exe 5012 9t.exe 5012 9t.exe 5012 9t.exe 5012 9t.exe 5012 9t.exe 5012 9t.exe 5012 9t.exe 5012 9t.exe 5012 9t.exe 5012 9t.exe 5012 9t.exe 5012 9t.exe 5012 9t.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5012 9t.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4256 fewvc.exe 4256 fewvc.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4256 wrote to memory of 5012 4256 fewvc.exe 87 PID 4256 wrote to memory of 5012 4256 fewvc.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\fewvc.exe"C:\Users\Admin\AppData\Local\Temp\fewvc.exe"1⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4256 -
C:\Windows\9t.exeC:\Windows\9t.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5012
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD561d9e025b8c4ad606a72f2a6b99bbfd8
SHA149d6aee652ab37d965a994a154a0bd0d52638397
SHA25627bbd93f7d0716fbe1a95ad8dcb25cdb735367b4d11f296aefbf21d7dd515214
SHA5120c615dcb34d651b2407113a98f73853c005b4b5f1d85eba605e829efef9a75397cb903458f0a7972308ca56333b35a96e33a3c008a8dd299458936a4f42ac0c7
-
Filesize
1.7MB
MD561d9e025b8c4ad606a72f2a6b99bbfd8
SHA149d6aee652ab37d965a994a154a0bd0d52638397
SHA25627bbd93f7d0716fbe1a95ad8dcb25cdb735367b4d11f296aefbf21d7dd515214
SHA5120c615dcb34d651b2407113a98f73853c005b4b5f1d85eba605e829efef9a75397cb903458f0a7972308ca56333b35a96e33a3c008a8dd299458936a4f42ac0c7