Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 17:57
Static task
static1
Behavioral task
behavioral1
Sample
09f5e97a577d17131f235d176a8a4eaf.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
09f5e97a577d17131f235d176a8a4eaf.exe
Resource
win10v2004-20231215-en
General
-
Target
09f5e97a577d17131f235d176a8a4eaf.exe
-
Size
60KB
-
MD5
09f5e97a577d17131f235d176a8a4eaf
-
SHA1
ddc5b056bf5bd521e36d5bbcefa84873b1c003e5
-
SHA256
7de1998455ebdda0699a2759ac744f05c125094c52de3cc5036513fcddc325fc
-
SHA512
ac3613ce7a108d8a01576d71652da0044cb553d656ce39aaa4806a61bde554a79c91d64461f59233f284b63936f3ca1142efafac726185ca6c6f4a76c37d20ff
-
SSDEEP
1536:WqBwbLWJLJFKqAZzrZA4kJJ6EzsWnCMQOb3S4V+EiUGHOd:WqBFJLzgOJJQgDdXiUGa
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x000900000002320b-6.dat acprotect -
Loads dropped DLL 4 IoCs
pid Process 3380 09f5e97a577d17131f235d176a8a4eaf.exe 3380 09f5e97a577d17131f235d176a8a4eaf.exe 3380 09f5e97a577d17131f235d176a8a4eaf.exe 3380 09f5e97a577d17131f235d176a8a4eaf.exe -
resource yara_rule behavioral2/files/0x000900000002320b-6.dat upx -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\winrar\ico\taobao.tbico 09f5e97a577d17131f235d176a8a4eaf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.tbico\ = "icofile" 09f5e97a577d17131f235d176a8a4eaf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.gz 09f5e97a577d17131f235d176a8a4eaf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.gz\ = "VBSFile" 09f5e97a577d17131f235d176a8a4eaf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.tbico 09f5e97a577d17131f235d176a8a4eaf.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3380 wrote to memory of 2224 3380 09f5e97a577d17131f235d176a8a4eaf.exe 92 PID 3380 wrote to memory of 2224 3380 09f5e97a577d17131f235d176a8a4eaf.exe 92 PID 3380 wrote to memory of 2224 3380 09f5e97a577d17131f235d176a8a4eaf.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\09f5e97a577d17131f235d176a8a4eaf.exe"C:\Users\Admin\AppData\Local\Temp\09f5e97a577d17131f235d176a8a4eaf.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Windows\SysWOW64\wscript.exewscript.exe /nologo "C:\Users\Admin\AppData\Local\Temp\3518.gz"2⤵PID:2224
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
18KB
MD5994669c5737b25c26642c94180e92fa2
SHA1d8a1836914a446b0e06881ce1be8631554adafde
SHA256bf01a1f272e0daf82df3407690b646e0ff6b2c562e36e47cf177eda71ccb6f6c
SHA512d0ab7ca7f890ef9e59015c33e6b400a0a4d1ce0d24599537e09e845f4b953e3ecd44bf3e3cbe584f57c2948743e689ed67d2d40e6caf923bd630886e89c38563
-
Filesize
21KB
MD5ab467b8dfaa660a0f0e5b26e28af5735
SHA1596abd2c31eaff3479edf2069db1c155b59ce74d
SHA256db267d9920395b4badc48de04df99dfd21d579480d103cae0f48e6578197ff73
SHA5127d002dc203997b8a4d8ec20c92cd82848e29d746414f4a61265c76d4afb12c05bce826fc63f4d2bd3d527f38506c391855767d864c37584df11b5db9ca008301