Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
164s -
max time network
180s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
23/12/2023, 10:57
Static task
static1
Behavioral task
behavioral1
Sample
702d28a918a048d292d1f0bd7d7963da047b4920b3ac7b16daa043f9701f42e0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
702d28a918a048d292d1f0bd7d7963da047b4920b3ac7b16daa043f9701f42e0.exe
Resource
win10v2004-20231215-en
General
-
Target
702d28a918a048d292d1f0bd7d7963da047b4920b3ac7b16daa043f9701f42e0.exe
-
Size
3.2MB
-
MD5
238a6a9df3087cc33a6c76433e89ae7b
-
SHA1
10cd4fb4f53c76c46c7550e8240c7da50680eec6
-
SHA256
702d28a918a048d292d1f0bd7d7963da047b4920b3ac7b16daa043f9701f42e0
-
SHA512
c230be86800d50169b84afe39e5e0ff7599e731af466853c7f6d4093354c6259fbbfcb8a283b99b7ce08ee758d14e0272bafff1c124f07d3f951653cd1b55646
-
SSDEEP
49152:YxdVJwZrWzElHkm7xAfovAF6RKcwSx+29uWV9D489V:YxRjzElE2AAvAF6RKx291PM+V
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2156 NSUDOLC.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: 702d28a918a048d292d1f0bd7d7963da047b4920b3ac7b16daa043f9701f42e0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
pid Process 3420 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2156 NSUDOLC.exe 2156 NSUDOLC.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4660 702d28a918a048d292d1f0bd7d7963da047b4920b3ac7b16daa043f9701f42e0.exe Token: SeDebugPrivilege 3420 taskkill.exe Token: SeDebugPrivilege 2156 NSUDOLC.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4660 702d28a918a048d292d1f0bd7d7963da047b4920b3ac7b16daa043f9701f42e0.exe 4660 702d28a918a048d292d1f0bd7d7963da047b4920b3ac7b16daa043f9701f42e0.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4660 wrote to memory of 3580 4660 702d28a918a048d292d1f0bd7d7963da047b4920b3ac7b16daa043f9701f42e0.exe 91 PID 4660 wrote to memory of 3580 4660 702d28a918a048d292d1f0bd7d7963da047b4920b3ac7b16daa043f9701f42e0.exe 91 PID 4660 wrote to memory of 3580 4660 702d28a918a048d292d1f0bd7d7963da047b4920b3ac7b16daa043f9701f42e0.exe 91 PID 3580 wrote to memory of 3420 3580 cmd.exe 93 PID 3580 wrote to memory of 3420 3580 cmd.exe 93 PID 3580 wrote to memory of 3420 3580 cmd.exe 93 PID 3580 wrote to memory of 2156 3580 cmd.exe 96 PID 3580 wrote to memory of 2156 3580 cmd.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\702d28a918a048d292d1f0bd7d7963da047b4920b3ac7b16daa043f9701f42e0.exe"C:\Users\Admin\AppData\Local\Temp\702d28a918a048d292d1f0bd7d7963da047b4920b3ac7b16daa043f9701f42e0.exe"1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\temp.bat2⤵
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Windows\SysWOW64\taskkill.exeTASKKILL /F /PID 46603⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3420
-
-
C:\Users\Admin\AppData\Local\Temp\NSUDOLC.exeNSUDOLC /U:S /P:E C:\Users\Admin\AppData\Local\Temp\702d28a918a048d292d1f0bd7d7963da047b4920b3ac7b16daa043f9701f42e0.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2156
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
99KB
MD50ac3e9d59309f599403ac51615bfe41b
SHA19041c5562558cb58ac98bd18de3c0ce370a59e1f
SHA2566d5e116c2af78b5585602d91bca3a436a0350630fc7c08412c0cafe55199547c
SHA512e5de92202f4d3ecaff8bd65c99cbbc98c2deaafafe1620be7169d0fed467bfa11ce727fa78f686166758ee3df0b040a2643dbd5a46ee74cc679e647ebdad6910
-
Filesize
145B
MD5978220f32785b0a5f21c888832508a53
SHA11c962d1ccd31987f7c52c46cdba9c75b1bbe386c
SHA256285c20761a7132a103c3de2d0a0ffd5b5944a72a74bd3612ca01a98571a3b50f
SHA5122a34a4f6d6c8a66539eaccd87fc72e56293a472f2be949eef09bee5b53f65a70ab883cc0ecc4786adc3aa342cf2a5ea65472abab9c7f7a888013ed3b5cabe7a9