Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 14:58
Static task
static1
Behavioral task
behavioral1
Sample
029f5c692ea8805fe7df56b5f7f58461.exe
Resource
win7-20231215-en
General
-
Target
029f5c692ea8805fe7df56b5f7f58461.exe
-
Size
878KB
-
MD5
029f5c692ea8805fe7df56b5f7f58461
-
SHA1
0438f1ffa6deb208da6077ea625be7f848c959e0
-
SHA256
20ecaa40127c96f9b16a0a4f495f2c4cbd8996acf10f9c582e10ff3b1329da26
-
SHA512
abf729666e3b5da05fd4205d91e3b099a8d469dcb40702e55b5ae6901fef1fe95719aba2e960aa8b395f3f05a5752e7d5f257aeebdd5a286ea55c915d7adf19e
-
SSDEEP
24576:nlMLKmtvPyHu7Ctw8T4S7y9pNg4W7HM8kcN+2QHCdH:liKmHyOGt5Fp7s8hQo
Malware Config
Signatures
-
Loads dropped DLL 6 IoCs
pid Process 532 029f5c692ea8805fe7df56b5f7f58461.exe 532 029f5c692ea8805fe7df56b5f7f58461.exe 532 029f5c692ea8805fe7df56b5f7f58461.exe 532 029f5c692ea8805fe7df56b5f7f58461.exe 532 029f5c692ea8805fe7df56b5f7f58461.exe 532 029f5c692ea8805fe7df56b5f7f58461.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 029f5c692ea8805fe7df56b5f7f58461.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4208 wrote to memory of 1416 4208 029f5c692ea8805fe7df56b5f7f58461.exe 89 PID 4208 wrote to memory of 1416 4208 029f5c692ea8805fe7df56b5f7f58461.exe 89 PID 4208 wrote to memory of 1416 4208 029f5c692ea8805fe7df56b5f7f58461.exe 89 PID 1416 wrote to memory of 532 1416 029f5c692ea8805fe7df56b5f7f58461.exe 90 PID 1416 wrote to memory of 532 1416 029f5c692ea8805fe7df56b5f7f58461.exe 90 PID 1416 wrote to memory of 532 1416 029f5c692ea8805fe7df56b5f7f58461.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\029f5c692ea8805fe7df56b5f7f58461.exe"C:\Users\Admin\AppData\Local\Temp\029f5c692ea8805fe7df56b5f7f58461.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Users\Admin\AppData\Local\Temp\029f5c692ea8805fe7df56b5f7f58461.exe"C:\Users\Admin\AppData\Local\Temp\029f5c692ea8805fe7df56b5f7f58461.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Users\Admin\AppData\Local\Temp\029f5c692ea8805fe7df56b5f7f58461.exe"C:\Users\Admin\AppData\Local\Temp\029f5c692ea8805fe7df56b5f7f58461.exe"3⤵
- Loads dropped DLL
- Checks whether UAC is enabled
PID:532
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD5d96f9d6cf32d58c2be08f2ae3154b410
SHA1cf9c726e72b0ff787c27dca6b1c7885ca490892b
SHA256f2edacb95fe66678d99a69524f10bdb3a35a66dbc107b7bb1a6c2209fdcddc9d
SHA51274b0984b0537839081facf8a0656b14175e3fee9a7bc84732fe2b9d438e7cdca6bba804b15f29b9b88b2c3fc24e1e37162c031d77836ee1957d0850be5fbab84
-
Filesize
5KB
MD544dac7f87bdf94d553f8d2cf073d605d
SHA121bf5d714b9fcab32ba40ff7d36e48c378b67a06
SHA2560e7dedad1360a808e7ab1086ff1fffa7b72f09475c07a6991b74a6c6b78ccf66
SHA51292c6bf81d514b3a07e7796843200a78c17969720776b03c0d347aeefedb8f1269f6aac642728a38544836c1f17c594d570718d11368dc91fe5194ee5e83e1774
-
Filesize
494KB
MD5f0c59526f8186eadaf2171b8fd2967c1
SHA18ffbe3e03d8139b50b41931c7b3360a0eebdb5cb
SHA2566e35d85fe4365e508adc7faffc4517c29177380c2ba420f02c2b9ee03103d3f6
SHA512dccd287c5f25cac346836e1140b743756178d01cd58539cf8fac12f7ae54d338bfb4364c650edb4d6018ef1f4065f7e9835d32fd608f8ae66c67a0ffd05e9854
-
Filesize
200KB
MD55fcb430103c5ab1895d4977f50700119
SHA151431c26d64d4fcda76b738c03c8dcd3681b749b
SHA256d9e583e71c6c73907417d1c9985af870a5328fd599166199ed04391dea76521e
SHA512d7ed5239dd494990074f607ba7ff93ce3c45e8477aa583f46cc76ef2c9cbbd980297d1b1fdce2abbd715dc03afe337ecc65104c5e613bf6dbea660d0fb55eb98