Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 22:48
Static task
static1
Behavioral task
behavioral1
Sample
16e6a77a75cfd7252c1561efc9797a91.exe
Resource
win7-20231215-en
General
-
Target
16e6a77a75cfd7252c1561efc9797a91.exe
-
Size
877KB
-
MD5
16e6a77a75cfd7252c1561efc9797a91
-
SHA1
a695040c2722a09edbff32dd2c35b2f83ea8bc4b
-
SHA256
16a49e6be04438de907921a01ba77232dc4cdd6be1efcc9141d3d519204458df
-
SHA512
3a03c48f1e47563ed1d46f085cd11cbb9028c8dfcec7c65c8859916061cae63d8e333d4dcc27500066df4d71fc04ca0c51d3d8b674b0c58f5a05ffa78c4cf86f
-
SSDEEP
24576:KxMLKmtvPyHu7s8vPa9ndy9pNg4W7HM85cN+2QHC0c:kiKmHyOooP0Jp7s8wQy
Malware Config
Signatures
-
Loads dropped DLL 6 IoCs
pid Process 4516 16e6a77a75cfd7252c1561efc9797a91.exe 4516 16e6a77a75cfd7252c1561efc9797a91.exe 4516 16e6a77a75cfd7252c1561efc9797a91.exe 4516 16e6a77a75cfd7252c1561efc9797a91.exe 4516 16e6a77a75cfd7252c1561efc9797a91.exe 4516 16e6a77a75cfd7252c1561efc9797a91.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 16e6a77a75cfd7252c1561efc9797a91.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 536 wrote to memory of 1060 536 16e6a77a75cfd7252c1561efc9797a91.exe 27 PID 536 wrote to memory of 1060 536 16e6a77a75cfd7252c1561efc9797a91.exe 27 PID 536 wrote to memory of 1060 536 16e6a77a75cfd7252c1561efc9797a91.exe 27 PID 1060 wrote to memory of 4516 1060 16e6a77a75cfd7252c1561efc9797a91.exe 23 PID 1060 wrote to memory of 4516 1060 16e6a77a75cfd7252c1561efc9797a91.exe 23 PID 1060 wrote to memory of 4516 1060 16e6a77a75cfd7252c1561efc9797a91.exe 23
Processes
-
C:\Users\Admin\AppData\Local\Temp\16e6a77a75cfd7252c1561efc9797a91.exe"C:\Users\Admin\AppData\Local\Temp\16e6a77a75cfd7252c1561efc9797a91.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Users\Admin\AppData\Local\Temp\16e6a77a75cfd7252c1561efc9797a91.exe"C:\Users\Admin\AppData\Local\Temp\16e6a77a75cfd7252c1561efc9797a91.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1060
-
-
C:\Users\Admin\AppData\Local\Temp\16e6a77a75cfd7252c1561efc9797a91.exe"C:\Users\Admin\AppData\Local\Temp\16e6a77a75cfd7252c1561efc9797a91.exe"1⤵
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4516
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63KB
MD5edf552352527faae45f3d13f59ba458c
SHA1e3694d91d6a5cb9c7b8a87885df9a8eaf63768b3
SHA256f5c363c3580c09a90f6a0d7173d4ef302da329b09af6e101e3dbbbbf7dd1cd8c
SHA512d85f432127ee0722c5729fdce0a35875dd00bf0f74875848b13299f79947b31fd291004513a9bcc1b55d7c85bf1a0bbaf21cd40667bca9d8f6d6603a34a44931
-
Filesize
10KB
MD5a200f1bd5620bf625df0cbdb6729b7dc
SHA138195bb915c0faf28d3f25f472e3769882a97f7a
SHA25677ffb4ba6343bb8a20a2e6453c5765e957c99b64f94995083f64a6de7a0a2f9b
SHA5121c9302e0008aa639fde018114165dbd247012ff1d25213f2d7006b85cdbfcfa9a6f88363014d312c9d56dfb763398f9c3ab352462c49c40591002664272b2713
-
Filesize
5KB
MD544dac7f87bdf94d553f8d2cf073d605d
SHA121bf5d714b9fcab32ba40ff7d36e48c378b67a06
SHA2560e7dedad1360a808e7ab1086ff1fffa7b72f09475c07a6991b74a6c6b78ccf66
SHA51292c6bf81d514b3a07e7796843200a78c17969720776b03c0d347aeefedb8f1269f6aac642728a38544836c1f17c594d570718d11368dc91fe5194ee5e83e1774
-
Filesize
47KB
MD558d538b97960bc2848662f93a33242e0
SHA16f444fb02d58455129a5404a18a4dbf99a5a3599
SHA256bd547cc35745995678f2a507750250764a934edb7d16157be07dacd6d4120b72
SHA512215e3bf5f39b7e22dcee9cf5e971e1a46fc5817c8473166e607ed0f74863b372596c3c311b2b4623d8d3c8a0d926226d38a818caa3aa8f42cab5820c301e0c26
-
Filesize
6KB
MD503bc2773cfa0157d93a717d4568af535
SHA1f4ef28d089d59f71a466e0456e77d977561831cd
SHA256f794b4fe99f7add948746272c1a8863de9342573350e362644a5bc3b83c92acc
SHA5124ed67d04b8b01b0a55e72e2599593da2f2e795832b685c7ebc07b727b28b1ab5d2ae24d691516ccc4ce33e28a1d0558c0f12466c3968f08ff82b8e7482c11ca3
-
Filesize
54KB
MD52e0c18a4f114944846bc6ba51c062a41
SHA1dbb68fe0129407068eb28137fc71f80d0eeb3564
SHA2567c1f379ce919b02def59e5beb09c1d0462234dde3a3d72228c2aae91e054c6f9
SHA5125487739d5c613f4c67b67b39975aaa390889f208cf3f99f543ad9efd44a1c30b53f3a56e214d8bf71b65d035e0217056ddd7afce816f8cf6e9f19845a54c3b20