Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
0s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 12:53
Static task
static1
Behavioral task
behavioral1
Sample
1ffcb501c032d58702e7f5cf964913ac.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1ffcb501c032d58702e7f5cf964913ac.exe
Resource
win10v2004-20231222-en
General
-
Target
1ffcb501c032d58702e7f5cf964913ac.exe
-
Size
40KB
-
MD5
1ffcb501c032d58702e7f5cf964913ac
-
SHA1
c84bfc1a1c6055d41f7ebddda3560b402b67b25a
-
SHA256
135fbddd7675f3affc55e4261798f700c9775d668bf8016ef4177d4d768641b5
-
SHA512
4c8611935ad4303ec318f452452589e1b5da1357cbbcf575eb961870615b956accf4785e8386789ea185d59a4ff8eb28728e5a06ab86d6be1f66ca703d190d1b
-
SSDEEP
768:aq9m/ZsybSg2ts4L3RLc/qjhsKmHbk1+qJ0UtHG5QF:aqk/Zdic/qjh8w19JDHGy
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4064 services.exe -
resource yara_rule behavioral2/files/0x00070000000231f2-6.dat upx behavioral2/memory/4064-7-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4064-13-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4064-17-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4064-21-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4064-22-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4064-26-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4064-30-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4064-108-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4064-145-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4064-149-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4064-150-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4064-169-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4064-213-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4064-242-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4064-284-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" 1ffcb501c032d58702e7f5cf964913ac.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\services.exe 1ffcb501c032d58702e7f5cf964913ac.exe File opened for modification C:\Windows\java.exe 1ffcb501c032d58702e7f5cf964913ac.exe File created C:\Windows\java.exe 1ffcb501c032d58702e7f5cf964913ac.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1984 wrote to memory of 4064 1984 1ffcb501c032d58702e7f5cf964913ac.exe 18 PID 1984 wrote to memory of 4064 1984 1ffcb501c032d58702e7f5cf964913ac.exe 18 PID 1984 wrote to memory of 4064 1984 1ffcb501c032d58702e7f5cf964913ac.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\1ffcb501c032d58702e7f5cf964913ac.exe"C:\Users\Admin\AppData\Local\Temp\1ffcb501c032d58702e7f5cf964913ac.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
312B
MD55431b34b55fc2e8dfe8e2e977e26e6b5
SHA187cf8feeb854e523871271b6f5634576de3e7c40
SHA2563d7c76daab98368a0dd25cd184db039cdd5d1bc9bd6e9bb91b289119047f5432
SHA5126f309dd924ba012486bcf0e3bafe64899007893ea9863b6f4e5428384ad23d9942c74d17c42a5cf9922a0e0fd8d61c287a2288a945a775586125d53376b9325c
-
Filesize
305B
MD5157431349a057954f4227efc1383ecad
SHA169ccc939e6b36aa1fabb96ad999540a5ab118c48
SHA2568553409a8a3813197c474a95d9ae35630e2a67f8e6f9f33b3f39ef4c78a8bfac
SHA5126405adcfa81b53980f448c489c1d13506d874d839925bffe5826479105cbf5ba194a7bdb93095585441c79c58de42f1dab1138b3d561011dc60f4b66d11e9284
-
Filesize
25B
MD58ba61a16b71609a08bfa35bc213fce49
SHA18374dddcc6b2ede14b0ea00a5870a11b57ced33f
SHA2566aa63394c1f5e705b1e89c55ff19eed71957e735c3831a845ff62f74824e13f1
SHA5125855f5b2a78877f7a27ff92eaaa900d81d02486e6e2ea81d80b6f6cf1fe254350444980017e00cdeecdd3c67b86e7acc90cd2d77f06210bdd1d7b1a71d262df1
-
Filesize
304B
MD5cde2c6ec81201bdd39579745c69d502f
SHA1e025748a7d4361b2803140ed0f0abda1797f5388
SHA256a81000fc443c3c99e0e653cca135e16747e63bccebd5052ed64d7ae6f63f227f
SHA512de5ca6169b2bb42a452ebd2f92c23bad3a98c01845a875336d6affe7f0192c2782b1f66f149019c0b880410c836fc45b2e9157dcccc7ad0d9e5953521a2151d4
-
Filesize
304B
MD5267ddfdbb8d492b25de208d84b290f1c
SHA19f57d9f19f25549e1232489a0c101a92e851de2f
SHA256ef1f87447ae1ab45548d2934cf0dbd15a32b86359ff9fccfa48d76c1badf6586
SHA5120709aa62d39d419d335183235dcf328e1dfe6997bd9bfbdeb01bb050df8dcab63ec2d4f46e4718ab389fa8e12af66dec2e3019c8871ac6e40927a25cb706c6b3
-
Filesize
304B
MD568b8c190a6eab85ea8f4835df8de79c5
SHA143832bc2b2457c1431ecbb203f471a21c93ab69d
SHA256834c833dc3ad979c81ed54b4655d98f59bc679682a6738a3490355ccec21f7e9
SHA51298bf33e57e5b94a70843489837de4773ae6c709b1e6b77c27280af04c30c33918c7a513c05c17e60e868d13cf8394dc26ea04b000c812d9601edd990b7ea5cf5
-
Filesize
312B
MD5c15952329e9cd008b41f979b6c76b9a2
SHA153c58cc742b5a0273df8d01ba2779a979c1ff967
SHA2565d065a88f9a1fb565c2d70e87148d469dd9dcbbefea4ccc8c181745eda748ab7
SHA5126aecdd949abcd2cb54e2fe3e1171ee47c247aa3980a0847b9934f506ef9b2d3180831adf6554c68b0621f9f9f3cd88767ef9487bc6e51cecd6a8857099a7b296
-
Filesize
40KB
MD59febc4671047042502f0d8999f1b4c6c
SHA1a42a60f3c839d95b5b6ee783447460751222bebf
SHA25697fa9f663ff048c737fca1d23af119c08c2c73556e03947be386a868a6b4f798
SHA5128117719f1ad7dc19a28ef85c59a78a4c0297bde3fc4c088f544564c4a21186843ec704239e76740a8655bd8fe88bab39121de001d9e91dec0b91f58e6b493db3
-
Filesize
23KB
MD51b82c9fd6c297e589b39a10089517bb9
SHA13337e09bf1658327391c9486c2b48374c061ff8d
SHA25656c54e4216eb9c4741810dc35214d09586c85304c0ab160a9d5fbd0163fd77ce
SHA51256775dc7ae640ebbf5499a0396c314e7e6055c55f459433cf6d1f3a868e2d380d7248d9aaba56f985b67898f2128c7d42d32fc384d24e67a9ffbadf1daecf5a4
-
Filesize
1KB
MD5c07c6b592814b900021c541b95375f5e
SHA1d8303c95cd9bb8741c28a440c2590d8588c08a3e
SHA256475a43dc2bd5d0b4b3f7064f641eeeba42401a9f3a9b63aab18b1541d2431de2
SHA5125520c7d46f842d107a2eec49cfce15acc3bb3d13b420b08203621bddf318c510a2e8a3354e3ac9d9f35ed04aa730df3487c2ecd0755eda9d17dfd692f1e45c85
-
Filesize
1KB
MD589108bef1c83ac81ca7b9f1718f8e846
SHA1a1a7b4a470bc9daa613adffb494ef5d3a6ff7680
SHA25621c20b5be1e7a5e828f8fa08611d2fe6ce65bc9e0b563f1b90c6497d2a8aa596
SHA512634763ffe2ba8eaafc6c67ff9777470c19704c912d3cf6ace88cb982782bcc30afc45a043bae628a4a2fb08c7014b2af1593c63006d053ff75c1f56e658417e1
-
Filesize
1KB
MD593bc18e6abd7277ff87803b1702b2dee
SHA1633b28030fc3c1cac4e796f0a24fff6e0b2ecb4b
SHA2564874ba9f642cd70f4caa693d78146c1716daef3e1f20bebc1b09cb9defe59ee9
SHA512a5a34deca0aa4aef0b85afe2a7c49b748b8fe67ea079ef5d8e3ceb889ddc9b1ae6c586f3fb43312f338bb44b3904b894ee45d26d660162ce6e8a6d9e5c8b0093
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2