Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
158s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 21:33
Behavioral task
behavioral1
Sample
1d203bc511e64a8f9a40010595dfb5df.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1d203bc511e64a8f9a40010595dfb5df.exe
Resource
win10v2004-20231215-en
General
-
Target
1d203bc511e64a8f9a40010595dfb5df.exe
-
Size
190KB
-
MD5
1d203bc511e64a8f9a40010595dfb5df
-
SHA1
8a4dbf3c4367a67b2655c65ff4897d9496b4e6ef
-
SHA256
18b2069118ac058b90cb5f1e7afd220d5ee44cbddebfaaf411d094d90a892268
-
SHA512
64f510b23a6fecc597145cdb4e871dbdc7d2d776a8322ea30108d7c7c02e24eefe9af514c3eae6684851d9cf357e672543999a4d914852f4d4137eb1738d4ccd
-
SSDEEP
3072:5tY7o4FYVdPEbWy3KCPS2KhBuO7hgFdagOaHtamDYQ14TRsS5In42LwQObw6UzgT:5z0Ud5y3/S2iB57hgFAgRHNYc4TRy4eC
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2440 Kwadoa.exe -
resource yara_rule behavioral2/memory/4500-0-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral2/files/0x001000000002312c-9.dat upx -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job Kwadoa.exe File created C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job 1d203bc511e64a8f9a40010595dfb5df.exe File opened for modification C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job 1d203bc511e64a8f9a40010595dfb5df.exe File created C:\Windows\Kwadoa.exe 1d203bc511e64a8f9a40010595dfb5df.exe File opened for modification C:\Windows\Kwadoa.exe 1d203bc511e64a8f9a40010595dfb5df.exe File created C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job Kwadoa.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2364 2440 WerFault.exe 95 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Software\Microsoft\Internet Explorer\Main Kwadoa.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2440 Kwadoa.exe 2440 Kwadoa.exe 2440 Kwadoa.exe 2440 Kwadoa.exe 2440 Kwadoa.exe 2440 Kwadoa.exe 2440 Kwadoa.exe 2440 Kwadoa.exe 2440 Kwadoa.exe 2440 Kwadoa.exe 2440 Kwadoa.exe 2440 Kwadoa.exe 2440 Kwadoa.exe 2440 Kwadoa.exe 2440 Kwadoa.exe 2440 Kwadoa.exe 2440 Kwadoa.exe 2440 Kwadoa.exe 2440 Kwadoa.exe 2440 Kwadoa.exe 2440 Kwadoa.exe 2440 Kwadoa.exe 2440 Kwadoa.exe 2440 Kwadoa.exe 2440 Kwadoa.exe 2440 Kwadoa.exe 2440 Kwadoa.exe 2440 Kwadoa.exe 2440 Kwadoa.exe 2440 Kwadoa.exe 2440 Kwadoa.exe 2440 Kwadoa.exe 2440 Kwadoa.exe 2440 Kwadoa.exe 2440 Kwadoa.exe 2440 Kwadoa.exe 2440 Kwadoa.exe 2440 Kwadoa.exe 2440 Kwadoa.exe 2440 Kwadoa.exe 2440 Kwadoa.exe 2440 Kwadoa.exe 2440 Kwadoa.exe 2440 Kwadoa.exe 2440 Kwadoa.exe 2440 Kwadoa.exe 2440 Kwadoa.exe 2440 Kwadoa.exe 2440 Kwadoa.exe 2440 Kwadoa.exe 2440 Kwadoa.exe 2440 Kwadoa.exe 2440 Kwadoa.exe 2440 Kwadoa.exe 2440 Kwadoa.exe 2440 Kwadoa.exe 2440 Kwadoa.exe 2440 Kwadoa.exe 2440 Kwadoa.exe 2440 Kwadoa.exe 2440 Kwadoa.exe 2440 Kwadoa.exe 2440 Kwadoa.exe 2440 Kwadoa.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4500 1d203bc511e64a8f9a40010595dfb5df.exe 2440 Kwadoa.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4500 wrote to memory of 2440 4500 1d203bc511e64a8f9a40010595dfb5df.exe 95 PID 4500 wrote to memory of 2440 4500 1d203bc511e64a8f9a40010595dfb5df.exe 95 PID 4500 wrote to memory of 2440 4500 1d203bc511e64a8f9a40010595dfb5df.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d203bc511e64a8f9a40010595dfb5df.exe"C:\Users\Admin\AppData\Local\Temp\1d203bc511e64a8f9a40010595dfb5df.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Windows\Kwadoa.exeC:\Windows\Kwadoa.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:2440 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2440 -s 7763⤵
- Program crash
PID:2364
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2440 -ip 24401⤵PID:3220
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
190KB
MD51d203bc511e64a8f9a40010595dfb5df
SHA18a4dbf3c4367a67b2655c65ff4897d9496b4e6ef
SHA25618b2069118ac058b90cb5f1e7afd220d5ee44cbddebfaaf411d094d90a892268
SHA51264f510b23a6fecc597145cdb4e871dbdc7d2d776a8322ea30108d7c7c02e24eefe9af514c3eae6684851d9cf357e672543999a4d914852f4d4137eb1738d4ccd
-
Filesize
362B
MD591b54d7c0219df3e37937d2b528da504
SHA166e87ff17f9535348651cc7aeea83dcc83b6ecc8
SHA256101a0aca2b04643a655c8dc9a66a4edae20542ef2b02a355ea82788aa351d7a1
SHA512048d14e79b1b541953809bc093eac7d33d997019ccb28548a2523ab67788e7e0614611002a220c9773989cd02a41a8afb2b11698ada97ca4774e6b2b8bd5729b