Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
174s -
max time network
200s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2023, 19:37
Static task
static1
Behavioral task
behavioral1
Sample
01f90b6680e5f07ea60cb7a1facd2257.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
01f90b6680e5f07ea60cb7a1facd2257.exe
Resource
win10v2004-20231215-en
General
-
Target
01f90b6680e5f07ea60cb7a1facd2257.exe
-
Size
637KB
-
MD5
01f90b6680e5f07ea60cb7a1facd2257
-
SHA1
2181e83ba013ae6f57791ecd3f6c292a5fc2509f
-
SHA256
1e4fe73766ed76e4cbbac0d559b0b55f3c6957746a7bb93ae8daeda05706341f
-
SHA512
c9071874d904c83ad147961c611e5df5999d3e89597e21669a41b7c630dc41db38b0f1ac3af18f1c33db62b65b211efe8cacdf8943e2eddba3e62c1da8bf3000
-
SSDEEP
12288:osO5OtdEZBwT6qttAPEnGOCTha6vS0c9ZsD0B3sTq2WNl3y:oVQSjwvtwov16vS0cvM0B3yq2WTy
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2608 sxe21ED.tmp 388 WebSafe.ini -
Loads dropped DLL 2 IoCs
pid Process 1080 01f90b6680e5f07ea60cb7a1facd2257.exe 1080 01f90b6680e5f07ea60cb7a1facd2257.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\WebSafe.ini sxe21ED.tmp File opened for modification C:\Windows\SysWOW64\WebSafe.ini sxe21ED.tmp File opened for modification C:\Windows\SysWOW64\WebSafe.ini WebSafe.ini -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\uninstal.bat sxe21ED.tmp -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2608 sxe21ED.tmp Token: SeDebugPrivilege 388 WebSafe.ini -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1080 wrote to memory of 2608 1080 01f90b6680e5f07ea60cb7a1facd2257.exe 93 PID 1080 wrote to memory of 2608 1080 01f90b6680e5f07ea60cb7a1facd2257.exe 93 PID 1080 wrote to memory of 2608 1080 01f90b6680e5f07ea60cb7a1facd2257.exe 93 PID 2608 wrote to memory of 2144 2608 sxe21ED.tmp 98 PID 2608 wrote to memory of 2144 2608 sxe21ED.tmp 98 PID 2608 wrote to memory of 2144 2608 sxe21ED.tmp 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\01f90b6680e5f07ea60cb7a1facd2257.exe"C:\Users\Admin\AppData\Local\Temp\01f90b6680e5f07ea60cb7a1facd2257.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Users\Admin\AppData\Local\Temp\sxe21ED.tmp"C:\Users\Admin\AppData\Local\Temp\sxe21ED.tmp"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\uninstal.bat3⤵PID:2144
-
-
-
C:\Windows\SysWOW64\WebSafe.iniC:\Windows\SysWOW64\WebSafe.ini1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:388
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD5bd815b61f9948f93aface4033fbb4423
SHA1b5391484009b39053fc8b1bba63d444969bafcfa
SHA256b018bf9e9f8b6d945e6a2a25984970634884afabc580af2b4e855730520d5d76
SHA512a363abe97b5a44e5d36af859e8d484daffe1d8e321c87969a75d1bfaa4288a5e6be1922a02c6d72937c84e81a79a1c7f6c9f2a44a995cac3f993ed5608afcd71
-
Filesize
637KB
MD56833da160cda68c24e584aabd784f218
SHA1598908df0a14c93eda637acc0c53a01e19dbc079
SHA25662957dc61d9dae6f672e8301553ac7cd9b0a8533276aeadfbc6f2292951e0cdd
SHA512e709e73d6bc76fdabd1574ba5c88108b423c7c2bf62d9bbe1011ae2566953baba0c6a59fa34102f84cd9b965425f03fbffd00cc03edb417eb319b8905c83641f
-
Filesize
512KB
MD56b2a2941d4dc1e21f1674e4bc07f7a58
SHA16254ff9f8d13e76addb10cfa36e142a7f69c408d
SHA2566658347634e4344dc92d6c0a6db7b4a04b3240f97d12c247200e6fe185d493e9
SHA512a75cbfc529002e29317734eebb8ecb2f969a161aa47e5ac5dc28a1eece2dbfd8b17eeb6b9a4e43136e97fc3da865eef089a30f25eb95254f3f47bf642cdbd230
-
Filesize
64KB
MD538a66339eae656d42c29e0869d94a70f
SHA18a0e1066dd20afdd5a7d2da30bffbf989b59180f
SHA256e77fcf262e648e5ea3a9184beb9e97fbe866926d35746c97f2341dafab2d975d
SHA512aef31b14fb54141820a68534d52f019ffcb73eff0e380db40985ee9d97bee668293f9bd60e3d5b62d4203fca00599ee8045658ebf76ecaac46d6b10f07af0621
-
Filesize
140B
MD5f4b1f19949dbe3821ca6216591b0d240
SHA16e815f5cddaab7599c3aab70aabf7d2aa3535c08
SHA25629c80d09f08957f8f8304c57fd957bc4181f990d72587930616203470ba300ee
SHA51233b13916db9df43359275c2b37409a63ae7958a587f29363da5649d6ea09cbcc1b5bb0a223b3a4cbcddc13812d25cc650d9256b5e18837ba1e153b84e5b39571