Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 10:55
Static task
static1
Behavioral task
behavioral1
Sample
18d65f874ded93e21c8c86f9f4f40b52.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
18d65f874ded93e21c8c86f9f4f40b52.exe
Resource
win10v2004-20231215-en
General
-
Target
18d65f874ded93e21c8c86f9f4f40b52.exe
-
Size
1.1MB
-
MD5
18d65f874ded93e21c8c86f9f4f40b52
-
SHA1
6f18ad0336ffbf021c8658f172528bd3a609835a
-
SHA256
133a4154fb7d809b9a4d6bc22cdbe3c8074c1c793032a5928561ccd8bebeedef
-
SHA512
8868a8257b3e8ec36230a4226c50cf8393c802b60c2bbe8999a8db776a58167698fbb1f115729f4527bb1ac42bb3ccfd2bb36ab01296b885ef1687a002a74883
-
SSDEEP
24576:IWvknOMEfMdNOr9tSO45DGe2gxNioTRcTQGr7/czF6+I:IUeOMm+w90O45C0DEzUA+I
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4920 Setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS\Setup.exe = "1" Setup.exe Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN\Setup.exe = "0" Setup.exe Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SECURITYBAND Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SECURITYBAND\Setup.exe = "0" Setup.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3344 wrote to memory of 4920 3344 18d65f874ded93e21c8c86f9f4f40b52.exe 90 PID 3344 wrote to memory of 4920 3344 18d65f874ded93e21c8c86f9f4f40b52.exe 90 PID 3344 wrote to memory of 4920 3344 18d65f874ded93e21c8c86f9f4f40b52.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\18d65f874ded93e21c8c86f9f4f40b52.exe"C:\Users\Admin\AppData\Local\Temp\18d65f874ded93e21c8c86f9f4f40b52.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Users\Admin\AppData\Local\Temp\a2BOeIKMBm\yfJGEATl\Setup.exeC:\Users\Admin\AppData\Local\Temp\a2BOeIKMBm\yfJGEATl\Setup.exe --relaunch2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
PID:4920
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
25KB
MD5aa02ffb1942615f906834816d35c72fb
SHA1e21aa5a7c0f3032c1fe8962e74688adc7153467b
SHA2565994727c47ca7f928f8ce729180d8db80beb362ba6633ad0287e9f11f9b54ba8
SHA5123959ffc9cf0ecd8c680e0e7416a5d55d84950dcb6da495782f4586f55557e8d03155259cbd50da604f78d547c766d8a720deb978485903300975eb9b7507fa29
-
Filesize
17KB
MD5d5c03f223b885bb3a147ab2d18490296
SHA1dc94b282f7f80765ccf1097d8a31393f12df6aae
SHA256cc265b8333a2ff508ebeca5d2e0907ff855bba72c3135dbfcda3fc179d999aa7
SHA512a71efb5511c670254e3505b78cc740f8cd1876a5b9e3e931e65f18721b44977fc37bd697c74b76ad7f8c97c1399c38c44064a3b45b743afde011a9e73457bb2d