Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
82s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 11:44
Behavioral task
behavioral1
Sample
6bce5addba27609a17ceabef5225970e.exe
Resource
win7-20231215-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
6bce5addba27609a17ceabef5225970e.exe
Resource
win10v2004-20231222-en
5 signatures
150 seconds
General
-
Target
6bce5addba27609a17ceabef5225970e.exe
-
Size
42KB
-
MD5
6bce5addba27609a17ceabef5225970e
-
SHA1
66e3add1c262a95eb007a34d2a44bce3d473044f
-
SHA256
c643c6bde2641f7f7cd70e4bf78e9f03329a21fcee2554dc8b31fa25eae81e84
-
SHA512
8a1c68a0b4c0ccd1cb40d89d07d81d29ed222a0b2a9ab4e57467f2baa2ee20051357cf4ade2c9e2b64361a1b03d0ab71b2430c0c35a7ea2a8959267b1e304f56
-
SSDEEP
768:FErskEV4aJPvp5ILsNW7SKVd19Eky6Iu04Fg0Mk2CXgchMtCevOk:FIwtJPTqKWLd1EKFg0ACXOCev9
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1552 CSRSS.EXE -
resource yara_rule behavioral2/memory/4976-0-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/1552-6-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/4976-4-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/1552-7-0x0000000000400000-0x000000000041D000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\.svchost = "C:\\Windows\\System\\CSRSS.EXE" 6bce5addba27609a17ceabef5225970e.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\System\CSRSS.EXE 6bce5addba27609a17ceabef5225970e.exe File opened for modification C:\Windows\System\CSRSS.EXE 6bce5addba27609a17ceabef5225970e.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4976 wrote to memory of 1552 4976 6bce5addba27609a17ceabef5225970e.exe 59 PID 4976 wrote to memory of 1552 4976 6bce5addba27609a17ceabef5225970e.exe 59 PID 4976 wrote to memory of 1552 4976 6bce5addba27609a17ceabef5225970e.exe 59
Processes
-
C:\Users\Admin\AppData\Local\Temp\6bce5addba27609a17ceabef5225970e.exe"C:\Users\Admin\AppData\Local\Temp\6bce5addba27609a17ceabef5225970e.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Windows\System\CSRSS.EXEC:\Windows\System\CSRSS.EXE2⤵
- Executes dropped EXE
PID:1552
-