Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    118s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/12/2023, 23:09

General

  • Target

    06878532d9bc29f83b085018700f408b.exe

  • Size

    289KB

  • MD5

    06878532d9bc29f83b085018700f408b

  • SHA1

    ce6456855868264d0847cc0f3d85d261c196e064

  • SHA256

    bef40642a079f003a4f781cca2e276025f0d5627c240480489ab9dc4b86a271c

  • SHA512

    0bacae3d7838b5e28ecee1c7153376a05ee93931899191cea71f53c5a572ccaa452aad1d5907a94604319602327237a853cd477447f5fdcdff52a3317b0fe348

  • SSDEEP

    6144:jjLei4XUPyBKd6q5UfixpWzT7sNPwocpHkaVRo7/A4sTOH:jOQPMO6q5SiQ/sIoclznX466

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\06878532d9bc29f83b085018700f408b.exe
    "C:\Users\Admin\AppData\Local\Temp\06878532d9bc29f83b085018700f408b.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1356
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\MediaXCodec(3).exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\MediaXCodec(3).exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:724

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\MediaXCodec(3).exe

    Filesize

    14KB

    MD5

    7e9775a6a5b6fdcd67165b9db5175922

    SHA1

    ee8d280fe54addc1729f8621a7257f4900dbbd05

    SHA256

    e06c5d7067196b93c4b43a71570a51a4d409002e2c1a64d35e30232892f2c3bc

    SHA512

    c04482444da547c4121da1f46a2b2f353e352ddd4fef2e631402b34176fcc06def0a9dd5a8cf02d137d820b9d29239c6fbfc16d4f941bcd22940a3e0b653e790

  • memory/724-8-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/724-10-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/724-12-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/724-14-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/724-16-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB