Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
171s -
max time network
169s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 11:42
Static task
static1
Behavioral task
behavioral1
Sample
6ba7d7da1e1cf967a4727f9b2e2a0ea5.exe
Resource
win7-20231215-en
General
-
Target
6ba7d7da1e1cf967a4727f9b2e2a0ea5.exe
-
Size
876KB
-
MD5
6ba7d7da1e1cf967a4727f9b2e2a0ea5
-
SHA1
99f1c2f09a84a624b919994aeb22e6f408a026ce
-
SHA256
144c1c0c8cd8b680730fd04b7ea6821a68cad30f15d486c7049c6a10736bec7c
-
SHA512
fe486f839f0b58a2f22177f43e5718d38d95f37621a8d0c44eef1f7c36c27c5583507c92be142038372fa9ee012ae451502c7fdbd4dc6d009e26dd0c70248333
-
SSDEEP
24576:ZgqMLKmtvPyHu7EgwY97y9pNg4W7HM8mcN+2QHCvLt:ZRiKmHyOg49/p7s8LQk
Malware Config
Signatures
-
Loads dropped DLL 6 IoCs
pid Process 2588 6ba7d7da1e1cf967a4727f9b2e2a0ea5.exe 2588 6ba7d7da1e1cf967a4727f9b2e2a0ea5.exe 2588 6ba7d7da1e1cf967a4727f9b2e2a0ea5.exe 2588 6ba7d7da1e1cf967a4727f9b2e2a0ea5.exe 2588 6ba7d7da1e1cf967a4727f9b2e2a0ea5.exe 2588 6ba7d7da1e1cf967a4727f9b2e2a0ea5.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 6ba7d7da1e1cf967a4727f9b2e2a0ea5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 700 wrote to memory of 4928 700 6ba7d7da1e1cf967a4727f9b2e2a0ea5.exe 89 PID 700 wrote to memory of 4928 700 6ba7d7da1e1cf967a4727f9b2e2a0ea5.exe 89 PID 700 wrote to memory of 4928 700 6ba7d7da1e1cf967a4727f9b2e2a0ea5.exe 89 PID 4928 wrote to memory of 2588 4928 6ba7d7da1e1cf967a4727f9b2e2a0ea5.exe 90 PID 4928 wrote to memory of 2588 4928 6ba7d7da1e1cf967a4727f9b2e2a0ea5.exe 90 PID 4928 wrote to memory of 2588 4928 6ba7d7da1e1cf967a4727f9b2e2a0ea5.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\6ba7d7da1e1cf967a4727f9b2e2a0ea5.exe"C:\Users\Admin\AppData\Local\Temp\6ba7d7da1e1cf967a4727f9b2e2a0ea5.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:700 -
C:\Users\Admin\AppData\Local\Temp\6ba7d7da1e1cf967a4727f9b2e2a0ea5.exe"C:\Users\Admin\AppData\Local\Temp\6ba7d7da1e1cf967a4727f9b2e2a0ea5.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Users\Admin\AppData\Local\Temp\6ba7d7da1e1cf967a4727f9b2e2a0ea5.exe"C:\Users\Admin\AppData\Local\Temp\6ba7d7da1e1cf967a4727f9b2e2a0ea5.exe"3⤵
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2588
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD5520d1e59c7e4012cf63542fb90847513
SHA1ecef4138237761aba970f3bbcfaed94afa588c76
SHA256ad25bfaaa2fd9a357aeba58a47fd7d146ea3a6d0755cf9ec58250005f2a57906
SHA512265d20eecbe75cfe0a193145237a57b9656f4a2157b09ef5a73be397c91b5232800fb23dc95daf4b2b285bac867f7d10d0215caa00ef9e2251b9a22d4653415c
-
Filesize
5KB
MD544dac7f87bdf94d553f8d2cf073d605d
SHA121bf5d714b9fcab32ba40ff7d36e48c378b67a06
SHA2560e7dedad1360a808e7ab1086ff1fffa7b72f09475c07a6991b74a6c6b78ccf66
SHA51292c6bf81d514b3a07e7796843200a78c17969720776b03c0d347aeefedb8f1269f6aac642728a38544836c1f17c594d570718d11368dc91fe5194ee5e83e1774
-
Filesize
494KB
MD5f0c59526f8186eadaf2171b8fd2967c1
SHA18ffbe3e03d8139b50b41931c7b3360a0eebdb5cb
SHA2566e35d85fe4365e508adc7faffc4517c29177380c2ba420f02c2b9ee03103d3f6
SHA512dccd287c5f25cac346836e1140b743756178d01cd58539cf8fac12f7ae54d338bfb4364c650edb4d6018ef1f4065f7e9835d32fd608f8ae66c67a0ffd05e9854
-
Filesize
200KB
MD5ce44be7b265fc51f44f27ab82ca9fc7c
SHA154b5c1e4e25fd72690838b8fab15bcdd3298f749
SHA256a409baa20b7cf3eb37f311d47a41134198ba33625bfeed1845f044f1268e2abc
SHA512d115f19f9de1a41716e415bf81a010661d5391ac8a9820c242c8d8ea742fe2c69a67da751626752deb2f075bec3e63eec656f0924dbfd6d117eebf64343ccadf