Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 19:51
Behavioral task
behavioral1
Sample
0ee2b17105fbd7440f9712f4d1553538.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0ee2b17105fbd7440f9712f4d1553538.exe
Resource
win10v2004-20231215-en
General
-
Target
0ee2b17105fbd7440f9712f4d1553538.exe
-
Size
637KB
-
MD5
0ee2b17105fbd7440f9712f4d1553538
-
SHA1
a23f9e43626f40384088a7a9af431c90fea011a6
-
SHA256
cff69e52d538076b4e171dd763569061651bdbe007cba21370a7d7695d7aa18d
-
SHA512
75f2cb034870c973e734bcddae147bb285e585b756e4dc91f3b3e07ded1c629fee8031f36694f74313ac9d4547434b6e492761e6c21516041bdf6c00fa79a579
-
SSDEEP
12288:9JWwES1vRTzbtnOPYTlG4lqFL2ayYpj/vrigk2BDb9D5P/drs7nyvn7tlhLBd:npESZDMAl212ExHWi9D9u+lhLL
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 220 NSIS_setup.exe -
Loads dropped DLL 2 IoCs
pid Process 220 NSIS_setup.exe 220 NSIS_setup.exe -
resource yara_rule behavioral2/memory/868-0-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral2/memory/868-8-0x0000000000400000-0x000000000040C000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\pack.epk 0ee2b17105fbd7440f9712f4d1553538.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 868 wrote to memory of 220 868 0ee2b17105fbd7440f9712f4d1553538.exe 19 PID 868 wrote to memory of 220 868 0ee2b17105fbd7440f9712f4d1553538.exe 19 PID 868 wrote to memory of 220 868 0ee2b17105fbd7440f9712f4d1553538.exe 19
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ee2b17105fbd7440f9712f4d1553538.exe"C:\Users\Admin\AppData\Local\Temp\0ee2b17105fbd7440f9712f4d1553538.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Windows\temp\NSIS_setup.exe"C:\Windows\temp\NSIS_setup.exe" "/LICFILE=C:\Windows\temp\license.dat" "/MC=C:\Windows\system32\ffmmllddkk.exe" "/MCPARAMS=INSTALL:|37||172800"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:220
-