Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    0s
  • max time network
    135s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/12/2023, 08:46

General

  • Target

    60eb440b50deecf53d4c1ccd102dbc6d.exe

  • Size

    581KB

  • MD5

    60eb440b50deecf53d4c1ccd102dbc6d

  • SHA1

    a8c2d11441adf64c807fea44738a332271e7639a

  • SHA256

    050235ac7752d4e87878f733ba539e3a64a23ca442653e3e1ca0a5ca8e55b913

  • SHA512

    67711f06c393f3d5128dd4319d1846d7e043e49f1e9ec086c11d05cff79694f9e363b5ec7330572cf241cdfb34cc7589dc6023ce1a2c73c0f847d5263e7caa37

  • SSDEEP

    12288:wfDJhNH8ZkXWykEr8369tNFMP8NdHXpZ2achJC4+6:wLJbl+36tKPdhJ7b

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 21 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\60eb440b50deecf53d4c1ccd102dbc6d.exe
    "C:\Users\Admin\AppData\Local\Temp\60eb440b50deecf53d4c1ccd102dbc6d.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1068
    • C:\Users\Admin\AppData\Local\Temp\1431831751.exe
      C:\Users\Admin\AppData\Local\Temp\1431831751.exe 9#2#2#7#5#3#4#7#8#0#8 Jk5HPTgwLCsqICdKU0BJREE5KRgvRjxSVUhNSEU9NTAYJkJHTE9GQDYqNyouMB4oPkZANiggJ0dQTT1QQFBYQUQ1KDQ3LRssTz5KVj1JXVNLRzpkbWxwMiYtcWtxK0A+S0slS01OJjxNTCdBTj5GHi08R0Y/REFENW5ELyw0L0ovTktNQDJKMkYtMjxLTDE6QR4oPy45KikwKCweLT0tOikqGC88KjsrKhssQC01LSkXLUIuOCotGSdQSkZCUzxPXExLQVY5Olc7GSpNTkg8VTtLXUNORz45GSdQSkZCUzxPXEo6RUU1Fy1DUUBcUUtEPRgmQ1Y+WkBJPURJRjw7HihDTE9NV0JKRlVRPk06LBknVEA4TElSSlJbTkpMNRctVEY4LxwoPFMpNB4tS1BLUEJFRVdOQ0o8SkpBQkVBPzxTUEU4HStCS19KTExSQkhCOW1qdV0XLVA+T1JOR0FOP1ZTUT5NXEA6UVM1KR4tQURBQVE1MRgmR1FYP1ZKOkVJO1ZDTDxNVkxNPUQ1XV9qbGAdKz1HV0ZDTT89WkZMNi42JiguMCczKy0wKSAnS0dLPjguMCwpOCwoNDEyGyxASE9OREY/QlhPRkk+NTUnKDUtKysuMSMtOiwuOC8yJT5JGSdVOTRLbXNkaWhaHTJeLCwuJCNUZWdcb29qKUxNJjMqKh0zWiJVTVAxMSEsWitMaWdiXmlxISteNyYnIzFbJm9yHithKSgsLiImaWVkXSs/XGFpaBssUUtEPWBrcm4eLl4hK14lKl1lY20sKywqKTFcXHFnYGkrZWdebx0pZFBuaVFlZl1EZ25samhcYUlaZmFfXHBdXWBtaGhxJSpdLzIsLDUwKi40KBwwZF1qdGplZ2FcZF9sWmJibh4qZikrMS8xLy4yLSglK10xMSw0NDIxKDEqMFhFQ3NPZjptTis4NktMXnNIckZiRmB1dEZlVnNBT2suQ2cuckdlMW5IQyxbV1EtMUg/aGlLPExqV2JmM0diLGRQSi4vRU8+Z1ByRS5CZ2VfU2YsMkRDMFtXMFNrVUNdWlpPTDZhT3N1X2YoZFA+WGZSLW1qUHJwKEh3ZWxIdmxIRlZKOlNpUnNOdkM+SzxRQVNOSC9NPjlkUWMvbFtldHM=
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:800
  • C:\Windows\SysWOW64\Wbem\wmic.exe
    wmic /output:C:\Users\Admin\AppData\Local\Temp\81704524305.txt bios get serialnumber
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3580
  • C:\Windows\SysWOW64\Wbem\wmic.exe
    wmic /output:C:\Users\Admin\AppData\Local\Temp\81704524305.txt bios get version
    1⤵
      PID:2296
    • C:\Windows\SysWOW64\Wbem\wmic.exe
      wmic /output:C:\Users\Admin\AppData\Local\Temp\81704524305.txt bios get version
      1⤵
        PID:3316
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81704524305.txt bios get version
        1⤵
          PID:3484
        • C:\Windows\SysWOW64\Wbem\wmic.exe
          wmic /output:C:\Users\Admin\AppData\Local\Temp\81704524305.txt bios get version
          1⤵
            PID:1604
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 800 -ip 800
            1⤵
              PID:4412
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 800 -s 952
              1⤵
              • Program crash
              PID:4976

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads