Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
154s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 03:38
Static task
static1
Behavioral task
behavioral1
Sample
0d368a2f162ca8c2f56daeaa8556dd4b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0d368a2f162ca8c2f56daeaa8556dd4b.exe
Resource
win10v2004-20231215-en
General
-
Target
0d368a2f162ca8c2f56daeaa8556dd4b.exe
-
Size
40KB
-
MD5
0d368a2f162ca8c2f56daeaa8556dd4b
-
SHA1
342af6d5f773a010d9a49822a07030317fcdf982
-
SHA256
dca1f8e75914c272d13043b525d34c41b98605f43ac9bf5f3ebfe7f12e89ecac
-
SHA512
6c8a70e2a38036fea4dc8fed5f68484a847c554430adcb5209964833f45a4695d6a3ff00ed6634f210c8cac889e7e747b62033a3a89e0cbc4fa726bb78b8858d
-
SSDEEP
768:aq9m/ZsybSg2ts4L3RLc/qjhsKmHbk1+qJ0UtHGqpp:aqk/Zdic/qjh8w19JDHv
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3536 services.exe -
resource yara_rule behavioral2/files/0x0009000000022480-4.dat upx behavioral2/memory/3536-5-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3536-13-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3536-17-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3536-18-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3536-22-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3536-23-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3536-27-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3536-31-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3536-32-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3536-36-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3536-40-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3536-41-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3536-105-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3536-141-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3536-156-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3536-188-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" 0d368a2f162ca8c2f56daeaa8556dd4b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\services.exe 0d368a2f162ca8c2f56daeaa8556dd4b.exe File opened for modification C:\Windows\java.exe 0d368a2f162ca8c2f56daeaa8556dd4b.exe File created C:\Windows\java.exe 0d368a2f162ca8c2f56daeaa8556dd4b.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4148 wrote to memory of 3536 4148 0d368a2f162ca8c2f56daeaa8556dd4b.exe 91 PID 4148 wrote to memory of 3536 4148 0d368a2f162ca8c2f56daeaa8556dd4b.exe 91 PID 4148 wrote to memory of 3536 4148 0d368a2f162ca8c2f56daeaa8556dd4b.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\0d368a2f162ca8c2f56daeaa8556dd4b.exe"C:\Users\Admin\AppData\Local\Temp\0d368a2f162ca8c2f56daeaa8556dd4b.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3536
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
312B
MD5c15952329e9cd008b41f979b6c76b9a2
SHA153c58cc742b5a0273df8d01ba2779a979c1ff967
SHA2565d065a88f9a1fb565c2d70e87148d469dd9dcbbefea4ccc8c181745eda748ab7
SHA5126aecdd949abcd2cb54e2fe3e1171ee47c247aa3980a0847b9934f506ef9b2d3180831adf6554c68b0621f9f9f3cd88767ef9487bc6e51cecd6a8857099a7b296
-
Filesize
25B
MD58ba61a16b71609a08bfa35bc213fce49
SHA18374dddcc6b2ede14b0ea00a5870a11b57ced33f
SHA2566aa63394c1f5e705b1e89c55ff19eed71957e735c3831a845ff62f74824e13f1
SHA5125855f5b2a78877f7a27ff92eaaa900d81d02486e6e2ea81d80b6f6cf1fe254350444980017e00cdeecdd3c67b86e7acc90cd2d77f06210bdd1d7b1a71d262df1
-
Filesize
40KB
MD5f5cc8f3cbdfa0d6392ad9381521328f5
SHA1a88041f62a2eef3a058bc73a1d2caf41b4bd6233
SHA25645231e520231c99bfa6ff00f9f481be24badf8da0e1accab80b016ca3d863094
SHA512352e086cd5c908dc93694968aea4cbd33127d281d56c840f6513fd31b7ff3a215dbbada2bd721bb84771148becda59b65a478d0533fc3cd3c041fbe5ff88a8a4
-
Filesize
1KB
MD51c992297168f62c12171305a50e8fd87
SHA1a79c507c0615fac5c4912e0cad64676ee572b0ee
SHA2562215bc5596056e69dd4012184458416bea74a187ebdfcb9b5739e4331e48c6ad
SHA5120e26ca6596c3cb494494a9f67d70efa33f34109b2363fef91ff07c32f43bcdba6f5f65efeb5630c1003b5ba3745c8464848929a408e041d974905f2b87572f57
-
Filesize
1KB
MD51aef3839f18bfac6648dd7390ad00f43
SHA13c9c268b48fe2d6a1a7ba92bb49969667797f572
SHA25601747caef360484d22d09619b3f4b8b67a69b79f8f7bb56f6e47762c841ae2cf
SHA5125af791197b8dd5e3aa963e7120073eee261aa11bd1ed927c97ecc7de7c37987c2f88a07869728c30753339c24fa43218b82f2c0fc537a65ad80421cd7c6a70df
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2