Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
107s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 11:31
Static task
static1
Behavioral task
behavioral1
Sample
1b033348eb704494cb04879ae35e4e72.exe
Resource
win7-20231215-en
General
-
Target
1b033348eb704494cb04879ae35e4e72.exe
-
Size
876KB
-
MD5
1b033348eb704494cb04879ae35e4e72
-
SHA1
3fbede97266628e49bf407ce4bde43ebbc33859f
-
SHA256
1137add87d101b0946f8896bbe3a2d86978caa4513d2c1ae3d8514e7cbf2dc2c
-
SHA512
ecc2e2bae426aed01817053533bb4b40b7f7115fdeeb6c5c4840e23371e45874d1f73c39918ef347cfcf62861e458621e005f74db5e5dc776885196cabe822c4
-
SSDEEP
24576:saMLKmtvPyHu7tiNxH5f1KSUy9pNg4W7HMZG3bOAHC69y:9iKmHyOMbZfQp7syg
Malware Config
Signatures
-
Loads dropped DLL 6 IoCs
pid Process 5080 1b033348eb704494cb04879ae35e4e72.exe 5080 1b033348eb704494cb04879ae35e4e72.exe 5080 1b033348eb704494cb04879ae35e4e72.exe 5080 1b033348eb704494cb04879ae35e4e72.exe 5080 1b033348eb704494cb04879ae35e4e72.exe 5080 1b033348eb704494cb04879ae35e4e72.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 1b033348eb704494cb04879ae35e4e72.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3592 wrote to memory of 1660 3592 1b033348eb704494cb04879ae35e4e72.exe 89 PID 3592 wrote to memory of 1660 3592 1b033348eb704494cb04879ae35e4e72.exe 89 PID 3592 wrote to memory of 1660 3592 1b033348eb704494cb04879ae35e4e72.exe 89 PID 1660 wrote to memory of 5080 1660 1b033348eb704494cb04879ae35e4e72.exe 90 PID 1660 wrote to memory of 5080 1660 1b033348eb704494cb04879ae35e4e72.exe 90 PID 1660 wrote to memory of 5080 1660 1b033348eb704494cb04879ae35e4e72.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b033348eb704494cb04879ae35e4e72.exe"C:\Users\Admin\AppData\Local\Temp\1b033348eb704494cb04879ae35e4e72.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Users\Admin\AppData\Local\Temp\1b033348eb704494cb04879ae35e4e72.exe"C:\Users\Admin\AppData\Local\Temp\1b033348eb704494cb04879ae35e4e72.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\1b033348eb704494cb04879ae35e4e72.exe"C:\Users\Admin\AppData\Local\Temp\1b033348eb704494cb04879ae35e4e72.exe"3⤵
- Loads dropped DLL
- Checks whether UAC is enabled
PID:5080
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD5b10ed3b4f780b0ad70822dbca457afd1
SHA1c15ed5e1bd59f020eb55b3921550f60b656b8f41
SHA256cc74d71c1f50850d465e0e619c40e93919192390562eebe8195449bd6285c095
SHA512f049e79af1e54e9bdce5a613cedb496ee6e75966a520ce689a7ac24595c5f8056a69391fad5117529a2031646892aa7db83c271d422bc546b23fd015019c1c12
-
Filesize
5KB
MD544dac7f87bdf94d553f8d2cf073d605d
SHA121bf5d714b9fcab32ba40ff7d36e48c378b67a06
SHA2560e7dedad1360a808e7ab1086ff1fffa7b72f09475c07a6991b74a6c6b78ccf66
SHA51292c6bf81d514b3a07e7796843200a78c17969720776b03c0d347aeefedb8f1269f6aac642728a38544836c1f17c594d570718d11368dc91fe5194ee5e83e1774
-
Filesize
494KB
MD5f0c59526f8186eadaf2171b8fd2967c1
SHA18ffbe3e03d8139b50b41931c7b3360a0eebdb5cb
SHA2566e35d85fe4365e508adc7faffc4517c29177380c2ba420f02c2b9ee03103d3f6
SHA512dccd287c5f25cac346836e1140b743756178d01cd58539cf8fac12f7ae54d338bfb4364c650edb4d6018ef1f4065f7e9835d32fd608f8ae66c67a0ffd05e9854
-
Filesize
200KB
MD5655fb19735969853b2437a75dd836f82
SHA1d6d6029e2817cec5e52581b3b841e114781ce967
SHA2561093cdfc749b8dd076bbf6ffbdf2ffd975651f45c2f5fc4d4e6655aebda27ab9
SHA512f2b64ef71946cf5a607050e4d7fd03a191436df62af8d167f377bbdeffa255b096ea4b45b9285eab2414faa7dd0b83c48d94ab49db54944e6db20bb370332ecd