Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 03:02
Static task
static1
Behavioral task
behavioral1
Sample
019d0da37d4464cfd839f0742453a21a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
019d0da37d4464cfd839f0742453a21a.exe
Resource
win10v2004-20231215-en
General
-
Target
019d0da37d4464cfd839f0742453a21a.exe
-
Size
12KB
-
MD5
019d0da37d4464cfd839f0742453a21a
-
SHA1
9f23d1a1f6512fd51798bafb93b50471743cdfda
-
SHA256
f001b71ff2656216fdb4736d230c560089d10e50c677f59f9d66c18277c27ba1
-
SHA512
2c432dd6dc95a06d856b9673adc88c35e0e0fe588fbc3885a0f78ff465df412665953762b508738754f2d45d9caeec693f0120362d16cee6f617a23bdd1e1333
-
SSDEEP
384:mRW/WzV8GOu2Wo+UdeDSSnAz/FXne4hb/:CiTptr
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\75BE5CEA\ImagePath = "C:\\Windows\\system32\\A95DA40D.EXE -k" 019d0da37d4464cfd839f0742453a21a.exe -
Executes dropped EXE 1 IoCs
pid Process 2360 A95DA40D.EXE -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\A95DA40D.EXE 019d0da37d4464cfd839f0742453a21a.exe File opened for modification C:\Windows\SysWOW64\A95DA40D.EXE 019d0da37d4464cfd839f0742453a21a.exe File created C:\Windows\SysWOW64\A95DA40D.EXE A95DA40D.EXE File created C:\Windows\SysWOW64\13445955.DLL A95DA40D.EXE File created C:\Windows\SysWOW64\del.bat 019d0da37d4464cfd839f0742453a21a.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4732 019d0da37d4464cfd839f0742453a21a.exe 4732 019d0da37d4464cfd839f0742453a21a.exe 2360 A95DA40D.EXE 2360 A95DA40D.EXE 2360 A95DA40D.EXE 2360 A95DA40D.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4732 wrote to memory of 3868 4732 019d0da37d4464cfd839f0742453a21a.exe 88 PID 4732 wrote to memory of 3868 4732 019d0da37d4464cfd839f0742453a21a.exe 88 PID 4732 wrote to memory of 3868 4732 019d0da37d4464cfd839f0742453a21a.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\019d0da37d4464cfd839f0742453a21a.exe"C:\Users\Admin\AppData\Local\Temp\019d0da37d4464cfd839f0742453a21a.exe"1⤵
- Sets service image path in registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\del.bat2⤵PID:3868
-
-
C:\Windows\SysWOW64\A95DA40D.EXEC:\Windows\SysWOW64\A95DA40D.EXE -k1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2360
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD5019d0da37d4464cfd839f0742453a21a
SHA19f23d1a1f6512fd51798bafb93b50471743cdfda
SHA256f001b71ff2656216fdb4736d230c560089d10e50c677f59f9d66c18277c27ba1
SHA5122c432dd6dc95a06d856b9673adc88c35e0e0fe588fbc3885a0f78ff465df412665953762b508738754f2d45d9caeec693f0120362d16cee6f617a23bdd1e1333