Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19/12/2023, 11:19
Static task
static1
Behavioral task
behavioral1
Sample
128f75228870ce98ca8731fe1a229402.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
128f75228870ce98ca8731fe1a229402.exe
Resource
win10v2004-20231215-en
General
-
Target
128f75228870ce98ca8731fe1a229402.exe
-
Size
95KB
-
MD5
128f75228870ce98ca8731fe1a229402
-
SHA1
397c042c0acfb68ab016af92515b9c99f1688914
-
SHA256
ee7c310b8d7203f9d6b5a8250bd069c0c0c4405c36262d8e720d2eeb2755c6b4
-
SHA512
81a59885465225dde350342c79910f1fd615997838ddc47ddd5cdbe0def2ea32db8acd888cf5877b885995e8010a3ed08078188f64c33f6a7d4919da44e5bb8d
-
SSDEEP
1536:qXI2qslHJlSrL1vGekLhVfBznOYro5+JKKKKKKKKKKKKKKKK6:qYelHJ1eykYro5+JKKKKKKKKKKKKKKKF
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3236 rundll32.exe 3888 DMe.exe -
Modifies system executable filetype association 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 128f75228870ce98ca8731fe1a229402.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" 128f75228870ce98ca8731fe1a229402.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command 128f75228870ce98ca8731fe1a229402.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\notepad¢¬.exe 128f75228870ce98ca8731fe1a229402.exe File created C:\Windows\SysWOW64\DMe.exe 128f75228870ce98ca8731fe1a229402.exe File opened for modification C:\Windows\SysWOW64\DMe.exe 128f75228870ce98ca8731fe1a229402.exe File opened for modification C:\Windows\SysWOW64\¢«.exe 128f75228870ce98ca8731fe1a229402.exe File created C:\Windows\SysWOW64\¢«.exe 128f75228870ce98ca8731fe1a229402.exe File opened for modification C:\Windows\SysWOW64\notepad¢¬.exe 128f75228870ce98ca8731fe1a229402.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system\rundll32.exe 128f75228870ce98ca8731fe1a229402.exe File created C:\Windows\system\rundll32.exe 128f75228870ce98ca8731fe1a229402.exe -
Modifies registry class 15 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 128f75228870ce98ca8731fe1a229402.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainVer = "510" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command 128f75228870ce98ca8731fe1a229402.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad.exe %1" 128f75228870ce98ca8731fe1a229402.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" 128f75228870ce98ca8731fe1a229402.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command 128f75228870ce98ca8731fe1a229402.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainUp = "1703000346" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainSetup = "1703000346" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" 128f75228870ce98ca8731fe1a229402.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv 128f75228870ce98ca8731fe1a229402.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4840 128f75228870ce98ca8731fe1a229402.exe 4840 128f75228870ce98ca8731fe1a229402.exe 4840 128f75228870ce98ca8731fe1a229402.exe 4840 128f75228870ce98ca8731fe1a229402.exe 4840 128f75228870ce98ca8731fe1a229402.exe 4840 128f75228870ce98ca8731fe1a229402.exe 4840 128f75228870ce98ca8731fe1a229402.exe 4840 128f75228870ce98ca8731fe1a229402.exe 4840 128f75228870ce98ca8731fe1a229402.exe 4840 128f75228870ce98ca8731fe1a229402.exe 4840 128f75228870ce98ca8731fe1a229402.exe 4840 128f75228870ce98ca8731fe1a229402.exe 4840 128f75228870ce98ca8731fe1a229402.exe 4840 128f75228870ce98ca8731fe1a229402.exe 4840 128f75228870ce98ca8731fe1a229402.exe 4840 128f75228870ce98ca8731fe1a229402.exe 4840 128f75228870ce98ca8731fe1a229402.exe 4840 128f75228870ce98ca8731fe1a229402.exe 4840 128f75228870ce98ca8731fe1a229402.exe 4840 128f75228870ce98ca8731fe1a229402.exe 4840 128f75228870ce98ca8731fe1a229402.exe 4840 128f75228870ce98ca8731fe1a229402.exe 4840 128f75228870ce98ca8731fe1a229402.exe 4840 128f75228870ce98ca8731fe1a229402.exe 4840 128f75228870ce98ca8731fe1a229402.exe 4840 128f75228870ce98ca8731fe1a229402.exe 4840 128f75228870ce98ca8731fe1a229402.exe 4840 128f75228870ce98ca8731fe1a229402.exe 4840 128f75228870ce98ca8731fe1a229402.exe 4840 128f75228870ce98ca8731fe1a229402.exe 3888 DMe.exe 3888 DMe.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4840 128f75228870ce98ca8731fe1a229402.exe 3236 rundll32.exe 3888 DMe.exe 3236 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4840 wrote to memory of 3236 4840 128f75228870ce98ca8731fe1a229402.exe 92 PID 4840 wrote to memory of 3236 4840 128f75228870ce98ca8731fe1a229402.exe 92 PID 4840 wrote to memory of 3236 4840 128f75228870ce98ca8731fe1a229402.exe 92 PID 4840 wrote to memory of 3888 4840 128f75228870ce98ca8731fe1a229402.exe 95 PID 4840 wrote to memory of 3888 4840 128f75228870ce98ca8731fe1a229402.exe 95 PID 4840 wrote to memory of 3888 4840 128f75228870ce98ca8731fe1a229402.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\128f75228870ce98ca8731fe1a229402.exe"C:\Users\Admin\AppData\Local\Temp\128f75228870ce98ca8731fe1a229402.exe"1⤵
- Modifies system executable filetype association
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Windows\system\rundll32.exeC:\Windows\system\rundll32.exe2⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3236
-
-
C:\Windows\SysWOW64\DMe.exe"C:\Windows\system32\DMe.exe" C:\Users\Admin\AppData\Local\Temp\128f75228870ce98ca8731fe1a229402.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3888
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD5128f75228870ce98ca8731fe1a229402
SHA1397c042c0acfb68ab016af92515b9c99f1688914
SHA256ee7c310b8d7203f9d6b5a8250bd069c0c0c4405c36262d8e720d2eeb2755c6b4
SHA51281a59885465225dde350342c79910f1fd615997838ddc47ddd5cdbe0def2ea32db8acd888cf5877b885995e8010a3ed08078188f64c33f6a7d4919da44e5bb8d
-
Filesize
90KB
MD5148ec1485b0b6fdee65ad7bb3d459667
SHA1c9fde5357cff7d148eef3ea095b1ef2801f949f5
SHA2566789d869ac5b8a9d0888c1a925c09849d3a68b36fc7d1cc46e784801b437d9f5
SHA5129e3e1d43f9f51b6f4465d635742a8a04e434efe07832d48d32e0b32323bcab752b972c85fa6be37c65e359d8eb802840a2de590fc6755f05a5c7e7768b5e06da