Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 08:58
Static task
static1
Behavioral task
behavioral1
Sample
1376a1424b7bd7a2fc8f09bc8b4f3b7f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1376a1424b7bd7a2fc8f09bc8b4f3b7f.exe
Resource
win10v2004-20231222-en
General
-
Target
1376a1424b7bd7a2fc8f09bc8b4f3b7f.exe
-
Size
1.1MB
-
MD5
1376a1424b7bd7a2fc8f09bc8b4f3b7f
-
SHA1
85adaefdf2827c9a33e32d71db9386f8c78fee74
-
SHA256
05bc9e2659699a6a0041f521f75944ee5d8bb01d0c5254b30d8fea8e996bc9aa
-
SHA512
735262e85213c5a57d351b87811cf81b21ebc8540e7815dbf0eb6c19c91560d57f6f7ebba7feef56f5a340abed703ccc34e83f152c23668ff99ccfa99d69b043
-
SSDEEP
24576:IWvknOMEf9XnphLEHe6fSUBw1DY0MWSeiNruiRApDj7X+sVbg:IUeOMm5EHN/Bw1FMWST6DX+6k
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1704 Setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS\Setup.exe = "1" Setup.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN\Setup.exe = "0" Setup.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SECURITYBAND Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SECURITYBAND\Setup.exe = "0" Setup.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS Setup.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2792 wrote to memory of 1704 2792 1376a1424b7bd7a2fc8f09bc8b4f3b7f.exe 94 PID 2792 wrote to memory of 1704 2792 1376a1424b7bd7a2fc8f09bc8b4f3b7f.exe 94 PID 2792 wrote to memory of 1704 2792 1376a1424b7bd7a2fc8f09bc8b4f3b7f.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\1376a1424b7bd7a2fc8f09bc8b4f3b7f.exe"C:\Users\Admin\AppData\Local\Temp\1376a1424b7bd7a2fc8f09bc8b4f3b7f.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Users\Admin\AppData\Local\Temp\a2vXvVjEn0\gD5LoGZn\Setup.exeC:\Users\Admin\AppData\Local\Temp\a2vXvVjEn0\gD5LoGZn\Setup.exe --relaunch2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
PID:1704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD51728ff5cb75fdbf78b7719379397e472
SHA124c30ae7b07f7ebf4732087c0f9ae72ad698a74a
SHA256bc2816c6d1ab788757e863fa63178d2d84dd6258719ef90dea2e3b7973c98005
SHA5127141e37f9920c1afd7748958451f4bec906c1bb9b17bb89510b045618b7b67016eb5a4d9bbeca9447c3a3fb43079877b5042ef5b409cf56189bb197ecaab0658
-
Filesize
10KB
MD5b5fdcd84a94739b86bf2e822fb095f7b
SHA1fcf3488fec2ff62b122a1fb79b7f7c4720192ec0
SHA256ad151f108d1cee628c1772990b3d5a3a5e04ce3fc26edab75dc7ce259a2c55a7
SHA5129bea72d6430b55490526b5d0ee5d9bfed65eb4e95d8b57373976fc3786df9b4edecb0eb1921b2d2441f588d50160f66180eda86503cac7bc58b313da2346b4e3