Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
31s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 07:46
Static task
static1
Behavioral task
behavioral1
Sample
5d6883464307b25c817f9a36f97ca626.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5d6883464307b25c817f9a36f97ca626.exe
Resource
win10v2004-20231222-en
General
-
Target
5d6883464307b25c817f9a36f97ca626.exe
-
Size
599KB
-
MD5
5d6883464307b25c817f9a36f97ca626
-
SHA1
c16077ddb69d3a570a86c5a41c5538267c17ff0f
-
SHA256
14d18ccbf2c0f1e5d4c99c3e706e9f1a9a853d3ee720a9b600147448e22b1ecd
-
SHA512
8d340a86a50443728c536fff4a2076c8d23433007f1f3f1ce658b326cf8381e01a982a65cce2f109cf5a9c0d42727bf960052f1eb2df6dc606f334aeb17837f3
-
SSDEEP
6144:XKWlw1Dx1TgzK7Yi06sCxVajmzx9S9HNBLlpY4Yi0flysVufBn597NX2F:X7lw1DxhgzaY5MxVaRPKxysgfBnnl2F
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4868 ocs_v8.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4868 ocs_v8.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4520 5d6883464307b25c817f9a36f97ca626.exe 4868 ocs_v8.exe 4868 ocs_v8.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4520 wrote to memory of 4868 4520 5d6883464307b25c817f9a36f97ca626.exe 17 PID 4520 wrote to memory of 4868 4520 5d6883464307b25c817f9a36f97ca626.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\5d6883464307b25c817f9a36f97ca626.exe"C:\Users\Admin\AppData\Local\Temp\5d6883464307b25c817f9a36f97ca626.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Users\Admin\AppData\Local\Temp\OCS\ocs_v8.exeC:\Users\Admin\AppData\Local\Temp\OCS\ocs_v8.exe -install -54474105 -chipde -02ea0a5f44e94a859e8d6c08d7989357 - -ChromeBundle -uwthvnqceunaczeh -6557382⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4868
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD57448afd00a627b962b60cf5fa7b906fa
SHA1bbe6d31c3af96f7cd27dd9604bfcca96c4a626e5
SHA256c842e7d740907b6c03262f3a0875725c3a7fe256ca954b61bb666d5d8d0f19a0
SHA512356cdd34847a63b0a1a6ca566287a9cee94152a9edc3c6c2d1c8c4a5db1633deaba80fd112cbb059eb4c6b247dda847aabc7b541c93c18fe18a54465322e84e3
-
Filesize
20KB
MD53155f2bf9a35ebe15862b45a39ee13a1
SHA1126745d28033bf94d332bd6dd85d90dd91599df7
SHA256bae12fd17abd4068e7fc1af096116e8e0775da1ab79f054983447834203da8e5
SHA51297306570b14a8ef2358e3184a3c52cd39765d9629543b89ba7fab5a99839fe7f7064fbe5f5271c45c329f1b9f18aec36756fcd5c1314fd00e4421eb78598da9b
-
Filesize
83B
MD50a139d93ddc2a474772392e6f50ef6f5
SHA1a301d3cd82496920f68a585d58862f38a5be67a4
SHA2560246cfdf76a7c9bf986941df9d68a7dfbdbdd559881e3bb24c9683d2a132e7f0
SHA51213187b2a7a6ed25b545fc0a53692502f402f1f643867615be3111e4f9f88ee8e0823462e1b1e123a6507bb75d20a13247eab01e0177aa53d0d8f0c35d46fbace