Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 20:13
Static task
static1
Behavioral task
behavioral1
Sample
101a1f29a5090087fe35a759eb7c94b6.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
101a1f29a5090087fe35a759eb7c94b6.exe
Resource
win10v2004-20231222-en
General
-
Target
101a1f29a5090087fe35a759eb7c94b6.exe
-
Size
14.9MB
-
MD5
101a1f29a5090087fe35a759eb7c94b6
-
SHA1
45f7cc9f39e22a6cc37fad0b8480692bf4124c36
-
SHA256
2f376a89c28d4002957d19e1a5945724ccc842c0b9d3fa619f42657ffc910fa6
-
SHA512
fa2f942e733fce3b7861fff2d07cec01105a5ddf53fba9498aa385217e060ba87cb87159469aa66e68d86470223f99f97b4483ad368d08fb587af8e06ed6410a
-
SSDEEP
393216:8RjeAy6tGbfjw3r+2S7avZ1vRK49ECOQIMnc:wLtGSaL7arj9EWIuc
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 624 vcredist_x64.exe 2424 vcredist_x64.exe -
Loads dropped DLL 1 IoCs
pid Process 2424 vcredist_x64.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 101a1f29a5090087fe35a759eb7c94b6.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4172 wrote to memory of 3912 4172 101a1f29a5090087fe35a759eb7c94b6.exe 25 PID 4172 wrote to memory of 3912 4172 101a1f29a5090087fe35a759eb7c94b6.exe 25 PID 3912 wrote to memory of 624 3912 cmd.exe 27 PID 3912 wrote to memory of 624 3912 cmd.exe 27 PID 3912 wrote to memory of 624 3912 cmd.exe 27 PID 624 wrote to memory of 2424 624 vcredist_x64.exe 31 PID 624 wrote to memory of 2424 624 vcredist_x64.exe 31 PID 624 wrote to memory of 2424 624 vcredist_x64.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\101a1f29a5090087fe35a759eb7c94b6.exe"C:\Users\Admin\AppData\Local\Temp\101a1f29a5090087fe35a759eb7c94b6.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c "setup.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vcredist_x64.exevcredist_x64.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Windows\Temp\{6D3BED0F-1583-4B03-B2FA-C32CDF5B6050}\.cr\vcredist_x64.exe"C:\Windows\Temp\{6D3BED0F-1583-4B03-B2FA-C32CDF5B6050}\.cr\vcredist_x64.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vcredist_x64.exe" -burn.filehandle.attached=552 -burn.filehandle.self=5644⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2424
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37B
MD5ee5b968cbf9dd2ca42239b02acbc2db7
SHA1985e71cc0b32a6b6288ddd04bda7f69b0ba4e0cd
SHA2563453ba6b867ab90d8ca0b07150742bad54f4b99a2e0c7b540ce75f9d6ba993a8
SHA512b3c6317e760b1a62a1564bf78d72985cb0ba0b19a243ff0777c4e72f66c2f2c90538b75b183f68806d7fd6d259935de2598cbee41070d4d6f3d86ea552671694
-
Filesize
13KB
MD534342ca7400e67066ef53047a8b3d057
SHA1b19eff8ddcb980b8df51daca5b51a6951605b528
SHA2569e7548ef95d88b0317505317f77c0336fd25756b85dc5e3c1319e3a0550db13d
SHA512222bdca63f140476d33b1b1fde742a87e59d90e7db5e2f09e6fa2fcbe10235eef08c11847c496a907e0af9cd16c58ca615edef61e08625d2183488fecfeb0584
-
Filesize
83KB
MD5b6cf0f08a7c84d953d43e1f6066dc344
SHA1220167b2a8bcd64b772ac957ab975788f92f12ba
SHA256aabfeb3bee50b9f5175bd3c6a796bc1b992e00eea77321f81a031350e81d4a0c
SHA512d3139d7d3f176b42427b80a4667187e3e9312bef81a580fb7ca39558af951d9f04e1a646ee59b3b1a2918f2fa24a095913723d8479bb409940ed2bf186af225b
-
Filesize
10KB
MD51637377163637f81780099162ec13565
SHA115e0bf8c584e96ec7267a8612873f3340b372ccb
SHA25674358a02aa6f2542115dffac04cc2cc1d2805751b9f8a37028edd963fc58e2a9
SHA51228e892d64e411ecc50f00262bf3b913ce6241078c47d2b318d9375fe47cb3ebd99c26ef80c129359ee0f377417ad80cde5de45dc3440eb2ae4e4660baaedecf5
-
Filesize
73KB
MD5d719841fc2471d6065a55b88f56ec68b
SHA149f23187282b0ef6b7c2248169e17083b35a3648
SHA256b2e096d873e31acf9f82a655999941bf4175d7a7461cac1d4e7a32548e7260a2
SHA5129c071eb56660701c3cdf71ef9dcb16dfb42bf6f1d2121a02430f3a8cb87baf220f3bcb1eccc45502bad183460472dd98036833545e3ccca4fde1b8a63f4de812
-
Filesize
1KB
MD5d6bd210f227442b3362493d046cea233
SHA1ff286ac8370fc655aea0ef35e9cf0bfcb6d698de
SHA256335a256d4779ec5dcf283d007fb56fd8211bbcaf47dcd70fe60ded6a112744ef
SHA512464aaab9e08de610ad34b97d4076e92dc04c2cdc6669f60bfc50f0f9ce5d71c31b8943bd84cee1a04fb9ab5bbed3442bd41d9cb21a0dd170ea97c463e1ce2b5b
-
Filesize
37KB
MD5787c9c04b02e02d57db54afb33f93b5c
SHA101baa85a35dc7699ee97df666ba54f17459fdc31
SHA2561eed383d87e3d2bfa0319f1df01fb22877a206b14b424cdbf452a0fe5024ad93
SHA512682d0c1b0d8aecb6059c7c1bc52be11acd45615b72db35186dab9cfe4fef367fef11e70cf919ceca46dda75998df54127ccf1386b8da49ab6a60510d21e601eb