Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
122s -
platform
windows10-1703_x64 -
resource
win10-20231129-en -
resource tags
arch:x64arch:x86image:win10-20231129-enlocale:en-usos:windows10-1703-x64system -
submitted
11/12/2023, 21:41
Static task
static1
Behavioral task
behavioral1
Sample
b4664bce05811dbb456b5102052ac0d5cf73806e76f39aeea6d9de830abae75e.exe
Resource
win10-20231129-en
General
-
Target
b4664bce05811dbb456b5102052ac0d5cf73806e76f39aeea6d9de830abae75e.exe
-
Size
7.5MB
-
MD5
cc5db2764ea1b0d820b550aebd07f02c
-
SHA1
341027f1039a9b5c7ca0926e78abc333941df245
-
SHA256
b4664bce05811dbb456b5102052ac0d5cf73806e76f39aeea6d9de830abae75e
-
SHA512
b31d6d9a4c159f2c18ed6913c943dba8f6e82af2b5492e19a0da7427e504764ec1dbef7076f1432d216355828383546b071145bda12a6d1acde9fe3094e7e9d2
-
SSDEEP
196608:lO78pimeIjZMmsj7bXzjl3iT1A9SG7ul2xdVNWiYmJE6RI6zj:478pimNjMDzjl3dQAdVN1YyRPzj
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3400 b4664bce05811dbb456b5102052ac0d5cf73806e76f39aeea6d9de830abae75e.tmp -
Loads dropped DLL 3 IoCs
pid Process 3400 b4664bce05811dbb456b5102052ac0d5cf73806e76f39aeea6d9de830abae75e.tmp 3400 b4664bce05811dbb456b5102052ac0d5cf73806e76f39aeea6d9de830abae75e.tmp 3400 b4664bce05811dbb456b5102052ac0d5cf73806e76f39aeea6d9de830abae75e.tmp -
Drops file in Program Files directory 6 IoCs
description ioc Process File created C:\Program Files (x86)\PlayGIF\uninstall\is-TLLIO.tmp b4664bce05811dbb456b5102052ac0d5cf73806e76f39aeea6d9de830abae75e.tmp File created C:\Program Files (x86)\PlayGIF\stuff\is-4MISO.tmp b4664bce05811dbb456b5102052ac0d5cf73806e76f39aeea6d9de830abae75e.tmp File created C:\Program Files (x86)\PlayGIF\stuff\is-035J0.tmp b4664bce05811dbb456b5102052ac0d5cf73806e76f39aeea6d9de830abae75e.tmp File created C:\Program Files (x86)\PlayGIF\stuff\is-AMBND.tmp b4664bce05811dbb456b5102052ac0d5cf73806e76f39aeea6d9de830abae75e.tmp File created C:\Program Files (x86)\PlayGIF\stuff\is-POTNM.tmp b4664bce05811dbb456b5102052ac0d5cf73806e76f39aeea6d9de830abae75e.tmp File created C:\Program Files (x86)\PlayGIF\uninstall\unins000.dat b4664bce05811dbb456b5102052ac0d5cf73806e76f39aeea6d9de830abae75e.tmp -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3400 b4664bce05811dbb456b5102052ac0d5cf73806e76f39aeea6d9de830abae75e.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1516 wrote to memory of 3400 1516 b4664bce05811dbb456b5102052ac0d5cf73806e76f39aeea6d9de830abae75e.exe 73 PID 1516 wrote to memory of 3400 1516 b4664bce05811dbb456b5102052ac0d5cf73806e76f39aeea6d9de830abae75e.exe 73 PID 1516 wrote to memory of 3400 1516 b4664bce05811dbb456b5102052ac0d5cf73806e76f39aeea6d9de830abae75e.exe 73
Processes
-
C:\Users\Admin\AppData\Local\Temp\b4664bce05811dbb456b5102052ac0d5cf73806e76f39aeea6d9de830abae75e.exe"C:\Users\Admin\AppData\Local\Temp\b4664bce05811dbb456b5102052ac0d5cf73806e76f39aeea6d9de830abae75e.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\is-QS9VE.tmp\b4664bce05811dbb456b5102052ac0d5cf73806e76f39aeea6d9de830abae75e.tmp"C:\Users\Admin\AppData\Local\Temp\is-QS9VE.tmp\b4664bce05811dbb456b5102052ac0d5cf73806e76f39aeea6d9de830abae75e.tmp" /SL5="$6019C,7611198,68096,C:\Users\Admin\AppData\Local\Temp\b4664bce05811dbb456b5102052ac0d5cf73806e76f39aeea6d9de830abae75e.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
PID:3400
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\is-QS9VE.tmp\b4664bce05811dbb456b5102052ac0d5cf73806e76f39aeea6d9de830abae75e.tmp
Filesize27KB
MD535c193e80e59bfc6268ee3172713a640
SHA11e5334e8c7cba2224f43d62e043beb69064363a9
SHA2566a4674bc69d9b62084cc5cf97fc93ca81c82bc31d7868e40d3558c3dbc025f96
SHA512db259712f02ee60282f23a09db30c018e3a5d4c2c292c129b4d1d08d913247304235508d1fe9ea534f62f9c26c9274c4ee1e45e20ce4a75dd60edda561a81b05
-
C:\Users\Admin\AppData\Local\Temp\is-QS9VE.tmp\b4664bce05811dbb456b5102052ac0d5cf73806e76f39aeea6d9de830abae75e.tmp
Filesize34KB
MD509987b920bdcda3c13f439164fdb73b1
SHA1b0d8dbc46622c5af038070b5564fe4b058e036da
SHA25618c8441cddc804a634422a302c25d7456658fbec95f37daa69d79a3c89a7cefc
SHA512404e7fac6f8168562117b7d7171efb13609e6b0fd3da569a8453fe9b1198c6faf0bef7d4427a463344167f4a24cace53b0e334e54c153e67dc993b78bb49cb67
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
19KB
MD53adaa386b671c2df3bae5b39dc093008
SHA1067cf95fbdb922d81db58432c46930f86d23dded
SHA25671cd2f5bc6e13b8349a7c98697c6d2e3fcdeea92699cedd591875bea869fae38
SHA512bbe4187758d1a69f75a8cca6b3184e0c20cf8701b16531b55ed4987497934b3c9ef66ecd5e6b83c7357f69734f1c8301b9f82f0a024bb693b732a2d5760fd303