Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2023, 23:35
Static task
static1
Behavioral task
behavioral1
Sample
0719756f5bb4eae79bc8128a46fe2f4f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0719756f5bb4eae79bc8128a46fe2f4f.exe
Resource
win10v2004-20231215-en
General
-
Target
0719756f5bb4eae79bc8128a46fe2f4f.exe
-
Size
28KB
-
MD5
0719756f5bb4eae79bc8128a46fe2f4f
-
SHA1
61c2f981b9534840c24a6af63e95b84359bc612e
-
SHA256
61b6d78da9996b7268edfc3bc77f818c15b2b1120b7d2e5b3c3bf3554f315183
-
SHA512
a795ae0e89a442c3cd45692ab2f9b1219c4ecf0023e6fce64e6b575c4d18f9717cd22dd51a229cbfdc871ad586af0fe448087ff0fa8f2054e7c1e65b9597c435
-
SSDEEP
384:kCKbQGufI8mQ9KaonyCvNmp5pnoQVYAtK9pSvILoj6qJx++j+jp0pNpRTZ2n+x0G:k52LKzyqmJnHyAtKzCILCJg+jmivwne
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2348 NTdHcP.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\NTdHcP.exe 0719756f5bb4eae79bc8128a46fe2f4f.exe File opened for modification C:\Windows\SysWOW64\NTdHcP.exe 0719756f5bb4eae79bc8128a46fe2f4f.exe File opened for modification C:\Windows\SysWOW64\NTdHcP.exe NTdHcP.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Deleteme.bat 0719756f5bb4eae79bc8128a46fe2f4f.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 940 wrote to memory of 2348 940 0719756f5bb4eae79bc8128a46fe2f4f.exe 88 PID 940 wrote to memory of 2348 940 0719756f5bb4eae79bc8128a46fe2f4f.exe 88 PID 940 wrote to memory of 2348 940 0719756f5bb4eae79bc8128a46fe2f4f.exe 88 PID 940 wrote to memory of 4496 940 0719756f5bb4eae79bc8128a46fe2f4f.exe 90 PID 940 wrote to memory of 4496 940 0719756f5bb4eae79bc8128a46fe2f4f.exe 90 PID 940 wrote to memory of 4496 940 0719756f5bb4eae79bc8128a46fe2f4f.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\0719756f5bb4eae79bc8128a46fe2f4f.exe"C:\Users\Admin\AppData\Local\Temp\0719756f5bb4eae79bc8128a46fe2f4f.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Windows\SysWOW64\NTdHcP.exeC:\Windows\system32\NTdHcP.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2348
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\Deleteme.bat2⤵PID:4496
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184B
MD5a844c857bac0b3b82f751a079eb88228
SHA12e9aa28e4901b54ce374121e93bdc4a23fb8f0d7
SHA256b16a487376d09dd3b930fcdbf54a4c114ec47e2a63a1d21042ba6e07d4fdaa38
SHA51206c960660c188e31ed17fef6c18f85bee06c47caac6e910ae4592cbf05f1dc51a12f2976543de802847215a0cd2269937bddda066b203db408522acd95626076
-
Filesize
28KB
MD50719756f5bb4eae79bc8128a46fe2f4f
SHA161c2f981b9534840c24a6af63e95b84359bc612e
SHA25661b6d78da9996b7268edfc3bc77f818c15b2b1120b7d2e5b3c3bf3554f315183
SHA512a795ae0e89a442c3cd45692ab2f9b1219c4ecf0023e6fce64e6b575c4d18f9717cd22dd51a229cbfdc871ad586af0fe448087ff0fa8f2054e7c1e65b9597c435