Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
0s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 22:18
Static task
static1
Behavioral task
behavioral1
Sample
152e82bb36b1c25cd89bbe14b76ece27.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
152e82bb36b1c25cd89bbe14b76ece27.exe
Resource
win10v2004-20231222-en
General
-
Target
152e82bb36b1c25cd89bbe14b76ece27.exe
-
Size
2.0MB
-
MD5
152e82bb36b1c25cd89bbe14b76ece27
-
SHA1
434fd6402e04a72438d9160db03c2d8492dc7d7b
-
SHA256
e0ba08f7e45c59be55719a3954ec51b1c1a077291a2850cd80107d2b656c71a8
-
SHA512
cb737d7c4e657f7df3fdaf67d1b1cf05ddb0692790fc21a23e2163ae0552eaae84cbfd971f6dbef2accb620d4f97785508c8c032bf3c879177c5c1d47f9b4f4f
-
SSDEEP
49152:0HWTNzzJOoX7OI+Rg+LdT6nyzm+ePW7UqNXoCccEkLGIay1v16+DOf4zfFLu3:0HqzJOoX7OI+Rg+LdTYyzmLPYNXoCJKR
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 3 IoCs
pid Process 1408 reg.exe 3592 reg.exe 3840 reg.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2292 152e82bb36b1c25cd89bbe14b76ece27.exe 2292 152e82bb36b1c25cd89bbe14b76ece27.exe 2292 152e82bb36b1c25cd89bbe14b76ece27.exe 2292 152e82bb36b1c25cd89bbe14b76ece27.exe 2292 152e82bb36b1c25cd89bbe14b76ece27.exe 2292 152e82bb36b1c25cd89bbe14b76ece27.exe 2292 152e82bb36b1c25cd89bbe14b76ece27.exe 2292 152e82bb36b1c25cd89bbe14b76ece27.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\152e82bb36b1c25cd89bbe14b76ece27.exe"C:\Users\Admin\AppData\Local\Temp\152e82bb36b1c25cd89bbe14b76ece27.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
PID:2292 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\syscheck.bat" "2⤵PID:3764
-
-
C:\Users\Admin\AppData\Roaming\RUNDLL.EXE"C:\Users\Admin\AppData\Roaming\RUNDLL.EXE"2⤵PID:1860
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\syscheck.bat" "2⤵PID:4164
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\syscheck.bat" "2⤵PID:4220
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Roaming\AVATAR196912_94.GIF2⤵PID:2168
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V rundll /D "\"C:\Users\Admin\AppData\Roaming\rundll.exe \"" /f1⤵PID:4640
-
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V rundll /D "\"C:\Users\Admin\AppData\Roaming\rundll.exe \"" /f2⤵
- Modifies registry key
PID:3840
-
-
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V rundll /D "\"C:\Users\Admin\AppData\Roaming\rundll.exe \"" /f1⤵
- Modifies registry key
PID:1408
-
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V rundll /D "\"C:\Users\Admin\AppData\Roaming\rundll.exe \"" /f1⤵
- Modifies registry key
PID:3592
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V rundll /D "\"C:\Users\Admin\AppData\Roaming\rundll.exe \"" /f1⤵PID:4860
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V rundll /D "\"C:\Users\Admin\AppData\Roaming\rundll.exe \"" /f1⤵PID:1264
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2168 CREDAT:17410 /prefetch:21⤵PID:2216
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD51a545d0052b581fbb2ab4c52133846bc
SHA162f3266a9b9925cd6d98658b92adec673cbe3dd3
SHA256557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1
SHA512bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
150B
MD51265b09eaea9e3c69fe1f6a4e8b00e6e
SHA144face1bde83d56e9d8906c6661a7fae05e330c6
SHA2569f67284e85933ba4412c4ab49c0638af67b6ee4db37f7c8d91bff97823dc6068
SHA51230574540682fb600fba844cf1e9b11205c3ac2eb64cfc661a07b8782938715ca4ccdd3ec5fcd2c0f18e34f2678c374adeca6f180ba792ce36826940b7188a57a
-
Filesize
77KB
MD52d1a0751ad853d1434c2a01588db73ac
SHA10a1eda8fb615a6c504ca299856159cce86cbe3d2
SHA256a73478bf96d9a5351a4cf414cb167d40edcb5a84567a887c9ad9047bf4ceda7d
SHA5120f627811f4f1f74746b851bd73dc93a478734ad669a4a5ae02de1d954dd38767aa503e056b8d994ae1b141632fbd1d758e05898a44f432e89812129af4b62e40
-
Filesize
88KB
MD55de50401c038ab538bde385b9eaaf042
SHA11c720841d9ea5f0acc8b7e64c0f570bd510c85c2
SHA256bc4c5f2228f650004b026b6f834df8761be1c0230f7599bbe0a7fc0dda5c777c
SHA5120bea1a20fce4f0d1e1be935c6c18f678fdbf306fc8a86608cb2b04b16f06ed37a9e31a12c992289dcd1a7cc9907b508c4138aa0e08a9eaf517fd31f47590284b
-
Filesize
44KB
MD56183668a6cbf73afe61e70a124dd2c17
SHA1d295c4bd859a8b235590c1f294e90f6275d29287
SHA256de47ed447f6202cbbaec9c05c03d24100da3447ceb30d4d19afe8c3f79d764a2
SHA51213aca8d5b6f49e2ecc3ba77fe08bc31cdf2baff4e4e97f4fae842651a9e35e75f7a6b987d74bdcca4bb414fe34612b50d0dc506a144c806a96d913da50dc8115
-
Filesize
32KB
MD5d32b07844cb85f572092ec39d1c06f78
SHA1d74c66309219abdfc492fc5f4adcb90e615c918f
SHA256077b44c43ca40ff76cbce6f5d3f5d7698d3c42a264bb04b1fce597a968c5e44f
SHA512a88377493db32cbcbb2de9e95d78735df7dc57901189223311d6796b97b570c76be4e270ac1e0d271b70ccd8683b82cbc947580364cb9c056150135b3884b0b9
-
Filesize
42KB
MD5a3130fbd1fc3effc83f362584871dcda
SHA1140c51aa3a98b18500deeb0b75213eb257505666
SHA256247054ad6e731cb1489117e0eba411fab1366d8bfd460abb245a16fe47af2c58
SHA51266b5cee3700b6a4dbd9ea4b45ddb8fdbc4d7055cf95f7f34f57ed23f6c1e9e4d259a05c2db47e97f38dc5185b0c6bfdcf56599124261abdc60e4499e2467ae50
-
Filesize
42KB
MD5fd529bbe7a53ea1ea6dad898bbdbb0e6
SHA113fe9c0a9046bb95dc62d4cbcc8ec8817f90b53b
SHA25645a5d0a7690d263bee1550165bded97347ea298773552be2b02f2942425f8a2f
SHA5128e38886a966bc30098528a1fb6c62365978d0f93daa780876d1bbd8ee4eb28a619546eee93cf07fa2f24148500612c261999a5adf7017ee8bcd9fdddb4cf59e7
-
Filesize
17KB
MD5845066a350664614d1debd9056d70519
SHA188ba41fae9bd9b050eb4ed4c35c4ffb8c4306fdc
SHA2569974380c5a1a2b7d26be35ad2b29bce5cfafbbd72f9192c40ecb40e14385fb20
SHA512902194fcd706a353960946b7bc80be90693efb0281ddb8b745ea5471dfd0a297a6f3a1bc7b9c2356497644cb7322c45928e1137eca7094f4b193353535e10af9
-
Filesize
92KB
MD52677fc250ef707f4a71868ede9bcd86a
SHA1ae49ef4855b95d8c7b95d002b33629953c53c541
SHA2565022e4be30b79c01e4d8b08ae7a99a03b732dfe447a7be9f8e8581737e66fd19
SHA5129d09c876a1211cbef268af64aa46f297eab34da3cc1b67b1a4d4a5824588d5d85746ec749d5a0f61d3f97d8c1e995b63e7ad4a35fcc9ded3aac5f62edf53f1f2
-
Filesize
37KB
MD5fba7438b6d672a6d0dc241bf0d9d342f
SHA1bb1b4451c27729df9c9ce68c9815579e8f458d02
SHA25678c52d2d8c47a45d6c0770cd3a85c788b515aeebd7081136bc8bebd1c3ff2d3a
SHA5125022a699f7579591cb8187f694c84b8e0413bd99d40f93257a455578682eb8404760403a117e6fbff1aeff8a8060be9603f4ad636f8189156fd2cd97c5b86606
-
Filesize
74KB
MD53e018c73f4b9b11411ba5b21199e571e
SHA108c9e76175a299c466c0217693be7ca24518e9f7
SHA256af6adecd57512b58e8caf08241ceb849b5b52f3daf7ff8dec793ad781209e9d2
SHA51223db34c9431c5888118ce3e5726ce9c0f2894d69ae3595d03d027298cd9453896a04fcb1a55b9b7c097a53bb7fc79cb28357a2af962f2fe8fa8d7c45ec882c16