Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
26s -
max time network
169s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 02:07
Static task
static1
Behavioral task
behavioral1
Sample
0b1bab6efd84cc3291d99fa199462b2b.exe
Resource
win7-20231215-en
General
-
Target
0b1bab6efd84cc3291d99fa199462b2b.exe
-
Size
876KB
-
MD5
0b1bab6efd84cc3291d99fa199462b2b
-
SHA1
84536f2d2547107c69402d69eac4954ee2cb5552
-
SHA256
23a3016434f96377c4805910d3ae561bde21263f52b8a0f40ede7173e14b9992
-
SHA512
61507b2036d5ecf7fa41fa6a5158896689e53aea712f39dc045affea8093e325b0b092e5ab37af15b55e72742b214a5bcfbd30c2f01cccad502f41088ef01d84
-
SSDEEP
24576:eOMLKmtvPyHu7DyiOy9pNg4W7HMAG3bOAHCS8zf:HiKmHyOn6p7sPC
Malware Config
Signatures
-
Loads dropped DLL 6 IoCs
pid Process 4440 0b1bab6efd84cc3291d99fa199462b2b.exe 4440 0b1bab6efd84cc3291d99fa199462b2b.exe 4440 0b1bab6efd84cc3291d99fa199462b2b.exe 4440 0b1bab6efd84cc3291d99fa199462b2b.exe 4440 0b1bab6efd84cc3291d99fa199462b2b.exe 4440 0b1bab6efd84cc3291d99fa199462b2b.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 0b1bab6efd84cc3291d99fa199462b2b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 516 wrote to memory of 2984 516 0b1bab6efd84cc3291d99fa199462b2b.exe 42 PID 516 wrote to memory of 2984 516 0b1bab6efd84cc3291d99fa199462b2b.exe 42 PID 516 wrote to memory of 2984 516 0b1bab6efd84cc3291d99fa199462b2b.exe 42 PID 2984 wrote to memory of 4440 2984 0b1bab6efd84cc3291d99fa199462b2b.exe 41 PID 2984 wrote to memory of 4440 2984 0b1bab6efd84cc3291d99fa199462b2b.exe 41 PID 2984 wrote to memory of 4440 2984 0b1bab6efd84cc3291d99fa199462b2b.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b1bab6efd84cc3291d99fa199462b2b.exe"C:\Users\Admin\AppData\Local\Temp\0b1bab6efd84cc3291d99fa199462b2b.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:516 -
C:\Users\Admin\AppData\Local\Temp\0b1bab6efd84cc3291d99fa199462b2b.exe"C:\Users\Admin\AppData\Local\Temp\0b1bab6efd84cc3291d99fa199462b2b.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2984
-
-
C:\Users\Admin\AppData\Local\Temp\0b1bab6efd84cc3291d99fa199462b2b.exe"C:\Users\Admin\AppData\Local\Temp\0b1bab6efd84cc3291d99fa199462b2b.exe"1⤵
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4440
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD5a40c2e3872fc00785bf8dbf39ea547e4
SHA1003943a1449857aaadb3e385a43a45bb6c90f869
SHA2564e8b93281958f0116703969be83f3faf227ea05614fb6db84b1594e114c71639
SHA5123680cd428e23e8f9b91ab63c0a25f3eebac968437127de0343bde5ec59b993a169920886b88b0b4136290b86c3f06567fce2b964f35ee53c420466c796da0f3f
-
Filesize
73KB
MD5c6ebad4112d5c06893e9d4bb6d78c8f8
SHA155c9aad03472b2c5e90a2dd409a424b971b30e6f
SHA256c8f2cc3598bc74bcd47cf362f4e5a8e4798544ba2d79191f10853e529837d9a7
SHA512664ebf7105a968263225b59d87533e8cd83172a6759385e2a1be9bf992047b20207b208c77c1f1432e8f897442f8a3a848f515476ed00ef083a4435e16db65de
-
Filesize
5KB
MD544dac7f87bdf94d553f8d2cf073d605d
SHA121bf5d714b9fcab32ba40ff7d36e48c378b67a06
SHA2560e7dedad1360a808e7ab1086ff1fffa7b72f09475c07a6991b74a6c6b78ccf66
SHA51292c6bf81d514b3a07e7796843200a78c17969720776b03c0d347aeefedb8f1269f6aac642728a38544836c1f17c594d570718d11368dc91fe5194ee5e83e1774
-
Filesize
17KB
MD55941514e905625cb0213326612433d8b
SHA1a19bb779a1d087d53335b81265c94db4a1fd7a42
SHA25633c3eaf4097854269ee10adf9eea17eb4c85d4f7ef2a4a4640e4d2b984ecf8b0
SHA5120952847da1858b21554a6030e44b6cb75cc4855abaaf53351429185954306d64af7a7f09e2c56274d6eb0adf1967902cfa3dcac970f3c20c2ecfcbe1f61300d9
-
Filesize
27KB
MD535d9d7c68a50f7944c734a280fd1225e
SHA1cc2902eb9e33c613fc290c5af06e58e936d5e0c3
SHA25666e920580283724d7bcd4997f74053569169e9596e3532be7881663e5d13aad6
SHA512b09db17bec08d0bd09259d12f38e163cddc627230ed2d78d027ec29314c9522040b80552284aef7b5f89e4d27d576014603583d05a4d9353b0ccfd8f210c3fe8
-
Filesize
77KB
MD5c73a8645efb57ddd156e1b7221461d41
SHA1d8ae347da913959826532d778755e3070f56c43e
SHA2567a56f8fd3b207d0ab6080fd57fcc847ec94ba2ba5b90bf6a277f9a52be7f1088
SHA512647d5d4caea5954beafa8800a7c96ad4b583f5a7f7fd040e60808f84b68862bb3029f58499df2030919a169e76f237b28f9da029d5dde39347d3536231cd389a