Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
158s -
max time network
168s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 15:19
Static task
static1
Behavioral task
behavioral1
Sample
28c444698b7a9dedcb904eb57a5cea7b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
28c444698b7a9dedcb904eb57a5cea7b.exe
Resource
win10v2004-20231215-en
General
-
Target
28c444698b7a9dedcb904eb57a5cea7b.exe
-
Size
40KB
-
MD5
28c444698b7a9dedcb904eb57a5cea7b
-
SHA1
8d6bf88cae8907121a65d14b538e40afee3e4f3b
-
SHA256
d716405069c8a4fc420fb1c74d740700ed4fa4cdb62803e4bd95df02b570e2a0
-
SHA512
351bd4d17da2b25d9844d83d81b99b49dffc233eb8b8ef97a0b74c36f8de4ff7729e43518032cecdac4dec6dfee8827f4096ce2981854dd4eb7fca02e6325f8c
-
SSDEEP
768:aq9m/ZsybSg2ts4L3RLc/qjhsKmHbk1+qJ0UtHoYQSK:aqk/Zdic/qjh8w19JDHoP
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2928 services.exe -
resource yara_rule behavioral2/files/0x0007000000023219-4.dat upx behavioral2/memory/2928-6-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/2928-13-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/2928-17-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/2928-18-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/2928-22-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/2928-23-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/2928-27-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/2928-31-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/2928-32-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/2928-36-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/2928-40-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/2928-41-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/2928-45-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/2928-49-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/2928-120-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/2928-126-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" 28c444698b7a9dedcb904eb57a5cea7b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\java.exe 28c444698b7a9dedcb904eb57a5cea7b.exe File created C:\Windows\java.exe 28c444698b7a9dedcb904eb57a5cea7b.exe File created C:\Windows\services.exe 28c444698b7a9dedcb904eb57a5cea7b.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3432 wrote to memory of 2928 3432 28c444698b7a9dedcb904eb57a5cea7b.exe 88 PID 3432 wrote to memory of 2928 3432 28c444698b7a9dedcb904eb57a5cea7b.exe 88 PID 3432 wrote to memory of 2928 3432 28c444698b7a9dedcb904eb57a5cea7b.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\28c444698b7a9dedcb904eb57a5cea7b.exe"C:\Users\Admin\AppData\Local\Temp\28c444698b7a9dedcb904eb57a5cea7b.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2928
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
25B
MD58ba61a16b71609a08bfa35bc213fce49
SHA18374dddcc6b2ede14b0ea00a5870a11b57ced33f
SHA2566aa63394c1f5e705b1e89c55ff19eed71957e735c3831a845ff62f74824e13f1
SHA5125855f5b2a78877f7a27ff92eaaa900d81d02486e6e2ea81d80b6f6cf1fe254350444980017e00cdeecdd3c67b86e7acc90cd2d77f06210bdd1d7b1a71d262df1
-
Filesize
312B
MD5c15952329e9cd008b41f979b6c76b9a2
SHA153c58cc742b5a0273df8d01ba2779a979c1ff967
SHA2565d065a88f9a1fb565c2d70e87148d469dd9dcbbefea4ccc8c181745eda748ab7
SHA5126aecdd949abcd2cb54e2fe3e1171ee47c247aa3980a0847b9934f506ef9b2d3180831adf6554c68b0621f9f9f3cd88767ef9487bc6e51cecd6a8857099a7b296
-
Filesize
40KB
MD50937db946a5ef0ffa2cdf19a9df656cb
SHA1a707d5ec6b5c4dcbbfc38f894891e98471c99b42
SHA2562a19266b4c1eab807d2e66232ba93b3a3a67f477dd2256c5e55a0a16f0f6e0ad
SHA5121c346cff65e6957f5e7e0941d9ae45a63029b381dcbf823396eb082ac9e04ae15e7951c34bcf350ecbb8d4c44c722409cd3aeb434b279b9a1511c6d59b3b3fe0
-
Filesize
1KB
MD547224a575e7e2bab7318d2bf3f0e13d1
SHA159936ba3210c0b2ff41f3f9222d3342947efd0e6
SHA2563b9c892b71cd652bb4111ed9220aa733a95937bd2d77725fbc12640259663f13
SHA5127f941848011f485e4bfd2a261b6509103d6ef58cb454162fdcc3264beb95418839ea86f665773fc7dbbb3cd12b1820d2c72ff4d7313ecb3f81b2d63268d8ff27
-
Filesize
1KB
MD5218fbcbc482e48cfb50679b404a77dfe
SHA1b7e8f5a91b4b2e6286c3c5fc53686c88c775b227
SHA2569942f873fc0e8bee6fd82b3874813f92f9c5c2fe10c01a4e01d07a746767899a
SHA51205631eb4344e7ec8ef771b1a7c645e13c7a5a0beeae09c956641d889f01584f1baec063f24ee06e32c745423feb2ecb5a73e2aa03591befddf5ffc5236f1f20e
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2