Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 20:44
Static task
static1
Behavioral task
behavioral1
Sample
11b33f7d609534d8b66f5a0822e4de3e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
11b33f7d609534d8b66f5a0822e4de3e.exe
Resource
win10v2004-20231215-en
General
-
Target
11b33f7d609534d8b66f5a0822e4de3e.exe
-
Size
347KB
-
MD5
11b33f7d609534d8b66f5a0822e4de3e
-
SHA1
54cc7edad01925b04322dac8098c6dda87cefa06
-
SHA256
210208179e5b58d849558ed55409a45dbc276935a4da1b5e53ec4745c7eb831c
-
SHA512
5bcc15d139987691f797fc51e59bb7749ac605247137a56ed351404b01b07c34a4b7b09554a62485bd1194c13376c7442138f64fd33f1fd2d72806dda3100067
-
SSDEEP
3072:94URpNUUX6z/DBXJfo/wGP2z5hS9u5rO+IpemPQ+Qir+2v:94SUjhto00HemPJrv
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 3 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x00060000000231f1-17.dat acprotect behavioral2/memory/1692-252-0x0000000074460000-0x0000000074469000-memory.dmp acprotect behavioral2/memory/1692-32-0x0000000074460000-0x0000000074469000-memory.dmp acprotect -
Loads dropped DLL 16 IoCs
pid Process 1692 11b33f7d609534d8b66f5a0822e4de3e.exe 1692 11b33f7d609534d8b66f5a0822e4de3e.exe 1692 11b33f7d609534d8b66f5a0822e4de3e.exe 1692 11b33f7d609534d8b66f5a0822e4de3e.exe 1692 11b33f7d609534d8b66f5a0822e4de3e.exe 1692 11b33f7d609534d8b66f5a0822e4de3e.exe 1692 11b33f7d609534d8b66f5a0822e4de3e.exe 1692 11b33f7d609534d8b66f5a0822e4de3e.exe 1692 11b33f7d609534d8b66f5a0822e4de3e.exe 1692 11b33f7d609534d8b66f5a0822e4de3e.exe 1692 11b33f7d609534d8b66f5a0822e4de3e.exe 1692 11b33f7d609534d8b66f5a0822e4de3e.exe 1692 11b33f7d609534d8b66f5a0822e4de3e.exe 1692 11b33f7d609534d8b66f5a0822e4de3e.exe 1692 11b33f7d609534d8b66f5a0822e4de3e.exe 1692 11b33f7d609534d8b66f5a0822e4de3e.exe -
resource yara_rule behavioral2/files/0x00060000000231f1-17.dat upx behavioral2/memory/1692-252-0x0000000074460000-0x0000000074469000-memory.dmp upx behavioral2/memory/1692-32-0x0000000074460000-0x0000000074469000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD534466cab38abcbc09ffac768d526f896
SHA12684f5f6c2b005cba812fc8cc1157777554fa3a3
SHA2568b4a1e7bf076c20240eb0a46cbdc8b835cfd89265fb78a3c1c5339ab820d2c1c
SHA5125c6ae996a81f0fd9d3efe4e61c8683eb833cb203a476772c06eadb48e10e34d05a8fc2c837cf663dcc3a37713bd86694c8eb251868aa5bb42c4b21ba8c8e8fc7
-
Filesize
2KB
MD5fa4f2b67eea58ecdb9987be32153c55b
SHA1c23e409bd651673d0ec8cf279e37969e26332b30
SHA2560b73011116b1a4b221067c92e3ad3a7947ce8d2f80dc557c5bd873a6eac9763a
SHA512bf220e2bc0895e335ac098aef6a0947c9e97e5c1b8892dbed8732bb1caf99fd486d92597b7157552da476d4cb878a9fa199ceedde7339421f6fcf42d4dad1c30
-
Filesize
2KB
MD54c559c6008c9fb28c1336ad5e0ef524a
SHA139362af532c55342393e8a3d513bf64f5339ca3f
SHA25652c210bdda8e3872ccd5a4e30eb4eb28cb280ad566da7944d43518ded0743716
SHA512a0b1f002c032b82306d66896602ba0f37f42c94a9588ba8c0ad6149bd46b106d4ef768cc03817f284f22f916ef7d32fab4af9f078f0e0d8954d6b5f3dd2d2382
-
Filesize
4KB
MD5aa849e7407cf349021812f62c001e097
SHA14cbb55b1d1dd95dcb7a36b5a44121ad4934539af
SHA25629b0e5792679756a79d501e3a9b317971b08e876fac1c2476180d0ae83b77ba5
SHA5124556baa49e8182d72e29e8d809635312142eb127039f5803ca0bf011b4359f0b584a670a3bd26a9969165a332cfa14a39abeaeae0b4d90519f91fdea755c54de