Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
113s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 16:24
Static task
static1
Behavioral task
behavioral1
Sample
0582ce91a380cf0d7e0839ea60962ee3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0582ce91a380cf0d7e0839ea60962ee3.exe
Resource
win10v2004-20231215-en
General
-
Target
0582ce91a380cf0d7e0839ea60962ee3.exe
-
Size
1.1MB
-
MD5
0582ce91a380cf0d7e0839ea60962ee3
-
SHA1
7cfe8d851a990de01c3c2c300d63eb53b0668d12
-
SHA256
13ef0d3d7a9b3c0c76349d6356099668a0c199fc34a7e0a7c8d0f27a4cde8c7c
-
SHA512
964bb82c0ad53e8983986a9382716925dfeddf4a046a009fb86c9e2011b3538ee3314a3b6764aaa7eb02254899a8c3144c99eb5ecd6b126fe9da5bb4eb2705c1
-
SSDEEP
24576:AWvknOMEfgQZc5upbjBGn7J7RilaiswfE6UGRLSqHLOOg+H:AUeOMmNZcIpHAnF7RwCuddTOOg+H
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4076 Setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN\Setup.exe = "0" Setup.exe Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SECURITYBAND Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SECURITYBAND\Setup.exe = "0" Setup.exe Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS\Setup.exe = "1" Setup.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3108 wrote to memory of 4076 3108 0582ce91a380cf0d7e0839ea60962ee3.exe 88 PID 3108 wrote to memory of 4076 3108 0582ce91a380cf0d7e0839ea60962ee3.exe 88 PID 3108 wrote to memory of 4076 3108 0582ce91a380cf0d7e0839ea60962ee3.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\0582ce91a380cf0d7e0839ea60962ee3.exe"C:\Users\Admin\AppData\Local\Temp\0582ce91a380cf0d7e0839ea60962ee3.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Users\Admin\AppData\Local\Temp\a2srK6JULd\E94JvJIr\Setup.exeC:\Users\Admin\AppData\Local\Temp\a2srK6JULd\E94JvJIr\Setup.exe --relaunch2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
PID:4076
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
52KB
MD5e78305314a203426af709b1433e8b773
SHA1c89144013679efb744fb555246a72635c9014264
SHA256326c474f4da34a6a40239eb868474e5e012f7eabb1505d169d2999e0637232ad
SHA5129865a125478b17f7f4d73d081fa93b426d6748fa298921a3cc1a89471b938a590def9fc684eb7f85bd5be8068a0aec684fb285384c9d9efd2635328752b52a02
-
Filesize
14KB
MD5c529e3855010e1dbb728a092e12de4fd
SHA1cddc900f5ed8847cbed7d8a61396cc3861e740ba
SHA2567c496f3a74aaf82d0342d6e722e256f45d0baa41f627e4649915347e16999a1d
SHA5127456c34f53a65649d7562f72fd5caffe9591edc2c1b0df60001fca95f7ae55abe4eca0d1ba008a77d9f932e6e2435f6390619d71e3cf48bed37d86525f50ff5f