Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 19:41
Static task
static1
Behavioral task
behavioral1
Sample
38c5c692eeb0ef0af5a40dcab423629c.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
38c5c692eeb0ef0af5a40dcab423629c.exe
Resource
win10v2004-20231215-en
General
-
Target
38c5c692eeb0ef0af5a40dcab423629c.exe
-
Size
40KB
-
MD5
38c5c692eeb0ef0af5a40dcab423629c
-
SHA1
a9bad266adebd7a3520ef5047801528e6f010ec8
-
SHA256
e29d4b2679be9447d5c672e77b4a74dd1396a14dc55aa435eaf2cb16d303fb60
-
SHA512
901d6b67eecec241e73f04b6adf7a1b21676bc2d1cc87d9e65ac97c3e3fd729b9b119c3e6956f24723cea6facc4904912c1a71c2bf503539df19059232da1574
-
SSDEEP
768:aq9m/ZsybSg2ts4L3RLc/qjhsKmHbk1+qJ0UtHf2Z:aqk/Zdic/qjh8w19JDHf2Z
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3176 services.exe -
resource yara_rule behavioral2/memory/3176-7-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/files/0x000c000000023160-6.dat upx behavioral2/memory/3176-13-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3176-17-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3176-21-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3176-22-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3176-26-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3176-30-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3176-31-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3176-35-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3176-39-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3176-40-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3176-139-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3176-245-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3176-270-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3176-274-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" 38c5c692eeb0ef0af5a40dcab423629c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\java.exe 38c5c692eeb0ef0af5a40dcab423629c.exe File created C:\Windows\services.exe 38c5c692eeb0ef0af5a40dcab423629c.exe File opened for modification C:\Windows\java.exe 38c5c692eeb0ef0af5a40dcab423629c.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3188 wrote to memory of 3176 3188 38c5c692eeb0ef0af5a40dcab423629c.exe 19 PID 3188 wrote to memory of 3176 3188 38c5c692eeb0ef0af5a40dcab423629c.exe 19 PID 3188 wrote to memory of 3176 3188 38c5c692eeb0ef0af5a40dcab423629c.exe 19
Processes
-
C:\Users\Admin\AppData\Local\Temp\38c5c692eeb0ef0af5a40dcab423629c.exe"C:\Users\Admin\AppData\Local\Temp\38c5c692eeb0ef0af5a40dcab423629c.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3176
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
145KB
MD546ad5da287d3aeb47f0214a481e95b94
SHA1650a87e790a4db0ca9deddc41e1a474e8f5ff170
SHA2566df1eb014dfc3b3fe3b79a39f9c9c30867675481e345b46914dd11676d1c6249
SHA5120570e481e8e1ff3bb0ff62df83320bae6cac2f9afbe08f901eed8326ad75f68dbe4222812c669265e59513a5bec215201bf4ac5358a67fc3233c4f678a52c589
-
Filesize
145KB
MD530b8ec835e5852da9d972756f1ef2280
SHA182e413cec3be4484e52674fd5b2b38c6c271b078
SHA256b17d4c348af823e8d3f55e2c354ba4f8441c577bfccf5e22ec70869c4e6aa6ec
SHA5124a7126bc9adc6f4c5aebd578fb15515e1529d59e91c7b5511fc377cecb176f461844b7af9bcf19858757b9321837fcdc896d19efe2eee9a7c031d55bd4b15ae0
-
Filesize
145KB
MD5c544f2e6b2c49004e1af302153254b7b
SHA138c58795dba8115dcc5d79cc18b28244565bc7c2
SHA25616abe75d397a594873cc65a0428fd85523caec1e8c8ea3bc7821af38e9da837d
SHA5124187db58cc73c0383e19d08c60e7d253c25ed3cf6861d8aff10048aae550d783ef9bceb5d204f6071b103ee4a7a12fdda9c9e0b4723ac453f2f38a3aac3e0622
-
Filesize
25B
MD58ba61a16b71609a08bfa35bc213fce49
SHA18374dddcc6b2ede14b0ea00a5870a11b57ced33f
SHA2566aa63394c1f5e705b1e89c55ff19eed71957e735c3831a845ff62f74824e13f1
SHA5125855f5b2a78877f7a27ff92eaaa900d81d02486e6e2ea81d80b6f6cf1fe254350444980017e00cdeecdd3c67b86e7acc90cd2d77f06210bdd1d7b1a71d262df1
-
Filesize
40KB
MD5463041c359f664d2b56b27a6d05500eb
SHA16b43e1649f18ecb064c5f5a4134de109255875c2
SHA256ac4dc9c9293ab2d501e5a6919ff74fdb9b37c555156bb9a83d7960e4b2dee0b3
SHA512e5ea7f12cdfe1a9a41b1d9f25c69fe38fdfd8b749022e0255187917ae39730e9202545c70c5ac9b9f5248acef45c147f6f101326b3e8644bd3d8a21c0fbd3920
-
Filesize
1KB
MD5121da391e335de39767597bfc48c1cc0
SHA1f813c9576b45a01cd69c6f4cefd394e9a5ab7699
SHA256a29fb5c37a824933f673b90eb917a5875f6040db05e698c1c2bb9f1b3f6c9874
SHA5123d423d6a79ae0aa041a5c216c463d660f76da63635fe27325aa126ca9391e011856d3e553cdc9743c8bad31104841c9ec6a035041ee21ef183310dc530ff2d90
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2