Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 15:13
Behavioral task
behavioral1
Sample
782b1355b6a487ece53107f96a0560d5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
782b1355b6a487ece53107f96a0560d5.exe
Resource
win10v2004-20231215-en
General
-
Target
782b1355b6a487ece53107f96a0560d5.exe
-
Size
12KB
-
MD5
782b1355b6a487ece53107f96a0560d5
-
SHA1
595f00e6e2c3ef3f8e4774c1b62505cb85551d36
-
SHA256
73f6cd833ecea15731452fba88c1ead3d6073b60f97a98f6a9c10d208b9a50af
-
SHA512
34fc752c382e5cdf43065011f63090adef06cd6a0e41053148865b3162d4fd264f734f5c18ce73f5f06b0020d149832e785fd0d4f6f529933adc04cf0143a97a
-
SSDEEP
192:GzWzF1QsL5TvBJ4XDfkB44rNqhza1oJHX5IG3pVns+KS1+:jF1QGTvB64rYguJJXs+V+
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 4716 xuntxnk.exe -
resource yara_rule behavioral2/memory/1544-0-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral2/files/0x0007000000023204-5.dat upx behavioral2/memory/1544-8-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral2/memory/4716-10-0x0000000000400000-0x000000000040F000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\xuntxnk.exe 782b1355b6a487ece53107f96a0560d5.exe File opened for modification C:\Windows\SysWOW64\xuntxnk.exe 782b1355b6a487ece53107f96a0560d5.exe File created C:\Windows\SysWOW64\xuntxn.dll 782b1355b6a487ece53107f96a0560d5.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1544 782b1355b6a487ece53107f96a0560d5.exe 1544 782b1355b6a487ece53107f96a0560d5.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1544 wrote to memory of 4716 1544 782b1355b6a487ece53107f96a0560d5.exe 96 PID 1544 wrote to memory of 4716 1544 782b1355b6a487ece53107f96a0560d5.exe 96 PID 1544 wrote to memory of 4716 1544 782b1355b6a487ece53107f96a0560d5.exe 96 PID 1544 wrote to memory of 3644 1544 782b1355b6a487ece53107f96a0560d5.exe 98 PID 1544 wrote to memory of 3644 1544 782b1355b6a487ece53107f96a0560d5.exe 98 PID 1544 wrote to memory of 3644 1544 782b1355b6a487ece53107f96a0560d5.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\782b1355b6a487ece53107f96a0560d5.exe"C:\Users\Admin\AppData\Local\Temp\782b1355b6a487ece53107f96a0560d5.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Windows\SysWOW64\xuntxnk.exeC:\Windows\system32\xuntxnk.exe ˜‰2⤵
- Executes dropped EXE
PID:4716
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\782b1355b6a487ece53107f96a0560d5.exe.bat2⤵PID:3644
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
182B
MD5bfb45efdcbd1d0addab1a1d4ca524a6e
SHA12fe051b694202e953e217dc698a778089eef821b
SHA25604846382f48b91ef0673e2a9aa82957055a8b22e70ec43fccadcfacc83087565
SHA51253cb2dc25251188cfb7ce239064a12844b901a88e2f018943004d3147c1c528e1b959ce09597adf8ccd9f380ccbb97e2ab4b861726191b0056628d71807523b8
-
Filesize
12KB
MD5782b1355b6a487ece53107f96a0560d5
SHA1595f00e6e2c3ef3f8e4774c1b62505cb85551d36
SHA25673f6cd833ecea15731452fba88c1ead3d6073b60f97a98f6a9c10d208b9a50af
SHA51234fc752c382e5cdf43065011f63090adef06cd6a0e41053148865b3162d4fd264f734f5c18ce73f5f06b0020d149832e785fd0d4f6f529933adc04cf0143a97a