Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    96s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/12/2023, 01:21

General

  • Target

    09eee7755e1cf4279ac29ada66dd0d82.exe

  • Size

    196KB

  • MD5

    09eee7755e1cf4279ac29ada66dd0d82

  • SHA1

    30262f204da06370e290e533ab34ac94d4535452

  • SHA256

    7d4733843e9f8dfd03ec44d5516737ff2a26b400a3b7a396e3a2be0d732ca8bc

  • SHA512

    091ce6ebd7cc3d7c9de6b6798c42f3580cb7e7ebb2852f7a9631e12105064689b41d38c5bc993ea7f637e5000acddad4c934f87e602559c232607ba9e1e870f8

  • SSDEEP

    3072:ApuAgBsUQxs7Lsu79NXbghxqLw7zbYGE70p6hCR4aIz3h3YmaWAIWXIzndBRv:eHgWdunLgrqLwzYVRsR23OmasWMdrv

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Registers COM server for autorun 1 TTPs 3 IoCs
  • Unexpected DNS network traffic destination 5 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\09eee7755e1cf4279ac29ada66dd0d82.exe
    "C:\Users\Admin\AppData\Local\Temp\09eee7755e1cf4279ac29ada66dd0d82.exe"
    1⤵
    • Registers COM server for autorun
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2164
  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3472

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2164-0-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2164-2-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2164-1-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2164-3-0x0000000002180000-0x0000000002181000-memory.dmp

    Filesize

    4KB

  • memory/2164-5-0x0000000002190000-0x00000000021C3000-memory.dmp

    Filesize

    204KB

  • memory/2164-6-0x00000000021D0000-0x00000000021D1000-memory.dmp

    Filesize

    4KB

  • memory/2164-4-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2164-7-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2164-14-0x0000000002190000-0x00000000021C3000-memory.dmp

    Filesize

    204KB

  • memory/2164-13-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/3472-11-0x0000000002F60000-0x0000000002F61000-memory.dmp

    Filesize

    4KB

  • memory/3472-15-0x0000000002F40000-0x0000000002F41000-memory.dmp

    Filesize

    4KB