Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
114s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 02:56
Behavioral task
behavioral1
Sample
0c4544cf311ddf6f01d0d299a891a58e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0c4544cf311ddf6f01d0d299a891a58e.exe
Resource
win10v2004-20231215-en
General
-
Target
0c4544cf311ddf6f01d0d299a891a58e.exe
-
Size
32KB
-
MD5
0c4544cf311ddf6f01d0d299a891a58e
-
SHA1
dd6a0886193e7053d912c52862a3bfd1d4a0d32f
-
SHA256
df1813471aca94c82713f4bf15290f1aada4e573f6e1f4d61ec3b1791ac85dfe
-
SHA512
87f0aa12e29a7b30848f748289d72d2f615e83756d65e26816cb6f500fb92f902cf13800fd46cab23c7feb0d4945404d036caa86d6f6bfc16c510db53c9d1a1e
-
SSDEEP
768:nPRDqKPeuoLm14j5CrDM16LQOcx44dxfftn5:PRDqKPe9Lm14jQrDMwQOcxpdxf7
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} 0c4544cf311ddf6f01d0d299a891a58e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Windows\\system32\\mst32init.exe" 0c4544cf311ddf6f01d0d299a891a58e.exe -
Sets file to hidden 1 TTPs 4 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 4008 attrib.exe 4316 attrib.exe 4756 attrib.exe 5056 attrib.exe -
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x00090000000231e1-6.dat acprotect -
resource yara_rule behavioral2/memory/4144-0-0x0000000000400000-0x000000000041B000-memory.dmp upx behavioral2/memory/4144-5-0x0000000000400000-0x000000000041B000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\netiu1.dll 0c4544cf311ddf6f01d0d299a891a58e.exe File opened for modification C:\Windows\SysWOW64\mst32init.exe 0c4544cf311ddf6f01d0d299a891a58e.exe File opened for modification C:\Windows\SysWOW64\netiu1.dll attrib.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\netiu1.dll attrib.exe File opened for modification C:\Windows\netiu1.dll 0c4544cf311ddf6f01d0d299a891a58e.exe File opened for modification C:\Windows\ 0c4544cf311ddf6f01d0d299a891a58e.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4144 0c4544cf311ddf6f01d0d299a891a58e.exe 4144 0c4544cf311ddf6f01d0d299a891a58e.exe 4144 0c4544cf311ddf6f01d0d299a891a58e.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4144 wrote to memory of 4756 4144 0c4544cf311ddf6f01d0d299a891a58e.exe 90 PID 4144 wrote to memory of 4756 4144 0c4544cf311ddf6f01d0d299a891a58e.exe 90 PID 4144 wrote to memory of 4756 4144 0c4544cf311ddf6f01d0d299a891a58e.exe 90 PID 4144 wrote to memory of 5056 4144 0c4544cf311ddf6f01d0d299a891a58e.exe 91 PID 4144 wrote to memory of 5056 4144 0c4544cf311ddf6f01d0d299a891a58e.exe 91 PID 4144 wrote to memory of 5056 4144 0c4544cf311ddf6f01d0d299a891a58e.exe 91 PID 4144 wrote to memory of 4008 4144 0c4544cf311ddf6f01d0d299a891a58e.exe 92 PID 4144 wrote to memory of 4008 4144 0c4544cf311ddf6f01d0d299a891a58e.exe 92 PID 4144 wrote to memory of 4008 4144 0c4544cf311ddf6f01d0d299a891a58e.exe 92 PID 4144 wrote to memory of 4316 4144 0c4544cf311ddf6f01d0d299a891a58e.exe 93 PID 4144 wrote to memory of 4316 4144 0c4544cf311ddf6f01d0d299a891a58e.exe 93 PID 4144 wrote to memory of 4316 4144 0c4544cf311ddf6f01d0d299a891a58e.exe 93 -
Views/modifies file attributes 1 TTPs 4 IoCs
pid Process 4756 attrib.exe 5056 attrib.exe 4008 attrib.exe 4316 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c4544cf311ddf6f01d0d299a891a58e.exe"C:\Users\Admin\AppData\Local\Temp\0c4544cf311ddf6f01d0d299a891a58e.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Windows\SysWOW64\attrib.exeattrib.exe +s +h C:\Windows\netiu1.dll2⤵
- Sets file to hidden
- Drops file in Windows directory
- Views/modifies file attributes
PID:4756
-
-
C:\Windows\SysWOW64\attrib.exeattrib.exe +s +h C:\Windows\system32\netiu1.dll2⤵
- Sets file to hidden
- Drops file in System32 directory
- Views/modifies file attributes
PID:5056
-
-
C:\Windows\SysWOW64\attrib.exeattrib.exe +s +h C:\Windows\2⤵
- Sets file to hidden
- Views/modifies file attributes
PID:4008
-
-
C:\Windows\SysWOW64\attrib.exeattrib.exe +s +h C:\Windows\system32\mst32init.exe2⤵
- Sets file to hidden
- Views/modifies file attributes
PID:4316
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD5b5f25913f5be4429d499070e127035e0
SHA17551200a282d4bf3375eb35faea9c07c8329f201
SHA2560121df6f8191a9226efcf8ceffecfbf85c13df733f077483c9333b8246854f19
SHA51227b17abbcceab1d8a639192f060fe9b29e237dcb0b96e2b21449de00ed585a0a548106ccce55e27cf2b53c9f68803ef51d4cc491c4523de2b01c706f3bfbde04