Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 00:56
Static task
static1
Behavioral task
behavioral1
Sample
093c8d7a05d6cef96c2a141a092d72a2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
093c8d7a05d6cef96c2a141a092d72a2.exe
Resource
win10v2004-20231222-en
General
-
Target
093c8d7a05d6cef96c2a141a092d72a2.exe
-
Size
568KB
-
MD5
093c8d7a05d6cef96c2a141a092d72a2
-
SHA1
b2007fd3d8dec75a0ffa2b295f36abea2f15924e
-
SHA256
b1ea47624509fd8032bcc3ea7b65b92eccd7d61b845ea910fa71bdb2beadf8cb
-
SHA512
6e600f4701348087682ecd0740cc51e57747f418eec561c8f84c12ab60ad3ed4481ed1ae235e9d989a407e53a4410fa7f2db4fba2f2adbb416f6f68a140ba075
-
SSDEEP
12288:Y3BVzPnECvCm8jU3uyoaF3Z4mxxAcVYLqagaRrS0oV:YbzfEHBjq9JQmXrVYl6V
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4576 exploer.exe 3216 exploer.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4576 set thread context of 3216 4576 exploer.exe 73 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\exploer.exe 093c8d7a05d6cef96c2a141a092d72a2.exe File opened for modification C:\Windows\exploer.exe 093c8d7a05d6cef96c2a141a092d72a2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3216 exploer.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1996 wrote to memory of 5004 1996 093c8d7a05d6cef96c2a141a092d72a2.exe 74 PID 1996 wrote to memory of 5004 1996 093c8d7a05d6cef96c2a141a092d72a2.exe 74 PID 1996 wrote to memory of 5004 1996 093c8d7a05d6cef96c2a141a092d72a2.exe 74 PID 4576 wrote to memory of 3216 4576 exploer.exe 73 PID 4576 wrote to memory of 3216 4576 exploer.exe 73 PID 4576 wrote to memory of 3216 4576 exploer.exe 73 PID 4576 wrote to memory of 3216 4576 exploer.exe 73 PID 4576 wrote to memory of 3216 4576 exploer.exe 73
Processes
-
C:\Users\Admin\AppData\Local\Temp\093c8d7a05d6cef96c2a141a092d72a2.exe"C:\Users\Admin\AppData\Local\Temp\093c8d7a05d6cef96c2a141a092d72a2.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\8125.bat2⤵PID:5004
-
-
C:\Windows\exploer.exe"C:\Windows\exploer.exe" 545451⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3216
-
C:\Windows\exploer.exeC:\Windows\exploer.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4576