Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
5s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 04:57
Static task
static1
Behavioral task
behavioral1
Sample
0670adf6d934f2642d33220a1c6fa0d1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0670adf6d934f2642d33220a1c6fa0d1.exe
Resource
win10v2004-20231215-en
General
-
Target
0670adf6d934f2642d33220a1c6fa0d1.exe
-
Size
23.7MB
-
MD5
0670adf6d934f2642d33220a1c6fa0d1
-
SHA1
d2c12675ee8941071ed08f02f357fe30ca1e3e95
-
SHA256
de5dc23f9794ae3c2cf7ea102a50b3fbc4f1b54229ff87dce56c73a3fb1c1d03
-
SHA512
a487c1aca7cfc20a886edc92614f3287e134377d1cf63b436063666a37225c10311006793729ccba1858eb9f513d367e4a8136fa330fe63e89509ec66fb95e33
-
SSDEEP
393216:uaq/j0SymQc9B+7cwWc8MU3p7T+kZyZG/G7ISHpJBaopSXykI7sgDUjVq:uB/QSTQyB+72xh+2G7dHpo9gYjVq
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 376 0670adf6d934f2642d33220a1c6fa0d1.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 376 0670adf6d934f2642d33220a1c6fa0d1.tmp 376 0670adf6d934f2642d33220a1c6fa0d1.tmp 376 0670adf6d934f2642d33220a1c6fa0d1.tmp 376 0670adf6d934f2642d33220a1c6fa0d1.tmp -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 376 0670adf6d934f2642d33220a1c6fa0d1.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3872 wrote to memory of 376 3872 0670adf6d934f2642d33220a1c6fa0d1.exe 24 PID 3872 wrote to memory of 376 3872 0670adf6d934f2642d33220a1c6fa0d1.exe 24 PID 3872 wrote to memory of 376 3872 0670adf6d934f2642d33220a1c6fa0d1.exe 24
Processes
-
C:\Users\Admin\AppData\Local\Temp\0670adf6d934f2642d33220a1c6fa0d1.exe"C:\Users\Admin\AppData\Local\Temp\0670adf6d934f2642d33220a1c6fa0d1.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3872 -
C:\Users\Admin\AppData\Local\Temp\is-MJ0QF.tmp\0670adf6d934f2642d33220a1c6fa0d1.tmp"C:\Users\Admin\AppData\Local\Temp\is-MJ0QF.tmp\0670adf6d934f2642d33220a1c6fa0d1.tmp" /SL5="$D01C6,24104104,139264,C:\Users\Admin\AppData\Local\Temp\0670adf6d934f2642d33220a1c6fa0d1.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:376 -
C:\Users\Admin\AppData\Local\Temp\is-7FIT8.tmp-dbinst\setup.exe"C:\Users\Admin\AppData\Local\Temp\is-7FIT8.tmp-dbinst\setup.exe" "C:\Users\Admin\AppData\Local\Temp\0670adf6d934f2642d33220a1c6fa0d1.exe" /title="Driver Booster 7" /dbver=7.3.0.675 /eula="C:\Users\Admin\AppData\Local\Temp\is-7FIT8.tmp-dbinst\EULA.rtf" /showlearnmore /pmtproduct /nochromepmt3⤵PID:1088
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD541eff616404ae6b32b42fb3bcf16fe3e
SHA1470e160d4d1085c75507a2d71729e2990c0d3a47
SHA256370bcc0fb7736805d803cfa976013b87678ac734c4f033986f2a16dae8f43c49
SHA5124bdf4f378082fd597e91bd2450e47117984f2c6179f33061ec7b1559e276013cf1cfa5d39922971e9febd1b2ba90927015376a8e117f6338ab3643d342278c24