Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
104s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 22:57
Static task
static1
Behavioral task
behavioral1
Sample
1f2d86094d2dee83912ad1da56e5dab8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1f2d86094d2dee83912ad1da56e5dab8.exe
Resource
win10v2004-20231215-en
General
-
Target
1f2d86094d2dee83912ad1da56e5dab8.exe
-
Size
886KB
-
MD5
1f2d86094d2dee83912ad1da56e5dab8
-
SHA1
00d2373d7ba174fa55044ea75ba35afc55dc9d1d
-
SHA256
6e9397dea8f93407c3d153610ddb3cc102bf0cbb7feaa5636d85f9a54a428382
-
SHA512
2df737f009d8c770b949fe2d7ca3a3c4d98c8a072df49471e505687b58db8a6858b123702e370ec0a31f3f6a305fdf0cc0573602dfa93086679a71706dce111e
-
SSDEEP
24576:FRmJkcoQricOIQxiZY1WNW+TmmAuDeFUGHC:KJZoQrbTFZY1WNW+TjXaC
Malware Config
Signatures
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/4624-0-0x0000000000400000-0x00000000004B0000-memory.dmp autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4624 1f2d86094d2dee83912ad1da56e5dab8.exe 4624 1f2d86094d2dee83912ad1da56e5dab8.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4624 1f2d86094d2dee83912ad1da56e5dab8.exe -
Suspicious use of FindShellTrayWindow 20 IoCs
pid Process 4624 1f2d86094d2dee83912ad1da56e5dab8.exe 4624 1f2d86094d2dee83912ad1da56e5dab8.exe 4624 1f2d86094d2dee83912ad1da56e5dab8.exe 4624 1f2d86094d2dee83912ad1da56e5dab8.exe 4624 1f2d86094d2dee83912ad1da56e5dab8.exe 4624 1f2d86094d2dee83912ad1da56e5dab8.exe 4624 1f2d86094d2dee83912ad1da56e5dab8.exe 4624 1f2d86094d2dee83912ad1da56e5dab8.exe 4624 1f2d86094d2dee83912ad1da56e5dab8.exe 4624 1f2d86094d2dee83912ad1da56e5dab8.exe 4624 1f2d86094d2dee83912ad1da56e5dab8.exe 4624 1f2d86094d2dee83912ad1da56e5dab8.exe 4624 1f2d86094d2dee83912ad1da56e5dab8.exe 4624 1f2d86094d2dee83912ad1da56e5dab8.exe 4624 1f2d86094d2dee83912ad1da56e5dab8.exe 4624 1f2d86094d2dee83912ad1da56e5dab8.exe 4624 1f2d86094d2dee83912ad1da56e5dab8.exe 4624 1f2d86094d2dee83912ad1da56e5dab8.exe 4624 1f2d86094d2dee83912ad1da56e5dab8.exe 4624 1f2d86094d2dee83912ad1da56e5dab8.exe -
Suspicious use of SendNotifyMessage 20 IoCs
pid Process 4624 1f2d86094d2dee83912ad1da56e5dab8.exe 4624 1f2d86094d2dee83912ad1da56e5dab8.exe 4624 1f2d86094d2dee83912ad1da56e5dab8.exe 4624 1f2d86094d2dee83912ad1da56e5dab8.exe 4624 1f2d86094d2dee83912ad1da56e5dab8.exe 4624 1f2d86094d2dee83912ad1da56e5dab8.exe 4624 1f2d86094d2dee83912ad1da56e5dab8.exe 4624 1f2d86094d2dee83912ad1da56e5dab8.exe 4624 1f2d86094d2dee83912ad1da56e5dab8.exe 4624 1f2d86094d2dee83912ad1da56e5dab8.exe 4624 1f2d86094d2dee83912ad1da56e5dab8.exe 4624 1f2d86094d2dee83912ad1da56e5dab8.exe 4624 1f2d86094d2dee83912ad1da56e5dab8.exe 4624 1f2d86094d2dee83912ad1da56e5dab8.exe 4624 1f2d86094d2dee83912ad1da56e5dab8.exe 4624 1f2d86094d2dee83912ad1da56e5dab8.exe 4624 1f2d86094d2dee83912ad1da56e5dab8.exe 4624 1f2d86094d2dee83912ad1da56e5dab8.exe 4624 1f2d86094d2dee83912ad1da56e5dab8.exe 4624 1f2d86094d2dee83912ad1da56e5dab8.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1f2d86094d2dee83912ad1da56e5dab8.exe"C:\Users\Admin\AppData\Local\Temp\1f2d86094d2dee83912ad1da56e5dab8.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4624