Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
76s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
28/12/2023, 22:01
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
fb4d81660045eb7432ade6adf20c3385.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
fb4d81660045eb7432ade6adf20c3385.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
fb4d81660045eb7432ade6adf20c3385.exe
-
Size
200KB
-
MD5
fb4d81660045eb7432ade6adf20c3385
-
SHA1
2ef72289927b09778516474b194e78d43467cfda
-
SHA256
5cd4ef16b0c4009cdc01d9d7c493c22008ca29834b3748582781297be4624f27
-
SHA512
c7bbce9e476842a60d537ce3ecf76869627f334f2158c1891ef041e73d233f314a86e3071c9a221d1152e72bb6acdffe87d08a725a8f6f4078b52ec5c71de79e
-
SSDEEP
6144:k50zTTCTee2f2cKpFynL/w6Nz40VCk0unquc6LdMjB:G0BKpUnTw6NziF
Score
8/10
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{16CB6C67-B7E6-0ADF-FC5A-115061DEEB9C}\stubpath = "%SystemRoot%\\system32\\V3Medic.exe" fb4d81660045eb7432ade6adf20c3385.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{16CB6C67-B7E6-0ADF-FC5A-115061DEEB9C} fb4d81660045eb7432ade6adf20c3385.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\V3Medic.exe fb4d81660045eb7432ade6adf20c3385.exe File opened for modification C:\Windows\SysWOW64\V3Medic.exe fb4d81660045eb7432ade6adf20c3385.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2748 fb4d81660045eb7432ade6adf20c3385.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2748 wrote to memory of 4352 2748 fb4d81660045eb7432ade6adf20c3385.exe 22 PID 2748 wrote to memory of 4352 2748 fb4d81660045eb7432ade6adf20c3385.exe 22 PID 2748 wrote to memory of 4352 2748 fb4d81660045eb7432ade6adf20c3385.exe 22 PID 2748 wrote to memory of 1352 2748 fb4d81660045eb7432ade6adf20c3385.exe 103 PID 2748 wrote to memory of 1352 2748 fb4d81660045eb7432ade6adf20c3385.exe 103 PID 2748 wrote to memory of 1352 2748 fb4d81660045eb7432ade6adf20c3385.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb4d81660045eb7432ade6adf20c3385.exe"C:\Users\Admin\AppData\Local\Temp\fb4d81660045eb7432ade6adf20c3385.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\SysWOW64\reg.exereg delete "HKEY_CURRENT_USER\Software\Microsoft\Active Setup\Installed Components\{16CB6C67-B7E6-0ADF-FC5A-115061DEEB9C}" /f2⤵PID:4352
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\FB4D81~1.EXE > nul2⤵PID:1352
-