Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 04:19
Static task
static1
Behavioral task
behavioral1
Sample
0e3f138b3083f07d9c282ead13952414.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0e3f138b3083f07d9c282ead13952414.exe
Resource
win10v2004-20231222-en
General
-
Target
0e3f138b3083f07d9c282ead13952414.exe
-
Size
242KB
-
MD5
0e3f138b3083f07d9c282ead13952414
-
SHA1
735ed22fd571500fee32d49a2b25bd72c83a87ae
-
SHA256
2b18ddb5377e8f8dee46667d360bede5d09a5e1d047ae99993d04e4f81840d51
-
SHA512
ccb77e566485e037e33fb48630804b826a68c823a61ce738d708405376657b504107d9c1f9ae1c0e7ef9111c93e484e9a465c3ec68500a9619bdfa2751e905ae
-
SSDEEP
6144:udXRrRvv7YdAh4qIDvzJvPSjGnuopYmK/i2amfD:u7Rvv8dSBIDvzxPOMuo3X2a4D
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1344 X -
Unexpected DNS network traffic destination 2 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 69.64.52.10 Destination IP 69.64.52.10 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1984 0e3f138b3083f07d9c282ead13952414.exe 1984 0e3f138b3083f07d9c282ead13952414.exe 1344 X 1344 X -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1984 0e3f138b3083f07d9c282ead13952414.exe Token: SeDebugPrivilege 1984 0e3f138b3083f07d9c282ead13952414.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1984 wrote to memory of 1344 1984 0e3f138b3083f07d9c282ead13952414.exe 41 PID 1984 wrote to memory of 1344 1984 0e3f138b3083f07d9c282ead13952414.exe 41 PID 1344 wrote to memory of 520 1344 X 40 PID 1344 wrote to memory of 520 1344 X 40 PID 1344 wrote to memory of 520 1344 X 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e3f138b3083f07d9c282ead13952414.exe"C:\Users\Admin\AppData\Local\Temp\0e3f138b3083f07d9c282ead13952414.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Local\f8310c6e\X*0*47*55cc15c*69.64.52.10:532⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1344
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:520