Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 05:36
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
10250490eae54ce8278f0fd7b76bf442.exe
Resource
win7-20231215-en
13 signatures
150 seconds
General
-
Target
10250490eae54ce8278f0fd7b76bf442.exe
-
Size
3.5MB
-
MD5
10250490eae54ce8278f0fd7b76bf442
-
SHA1
9c2da17830e823a7a5f87ba4e4028c696e2ed587
-
SHA256
c2614a7d00e8b96cbfb7cfec8235aacf7611d1412ce99587f9187beaf8d58da7
-
SHA512
d7155985372a53101a33a270409477a5590576eed385cb64bfad3980f59cea67238393fcd84ddd7e884a8dfe80d3668829099736664767d5193fe468d70ef007
-
SSDEEP
98304:k0WDGasi/Vhi+/ETrNmhJhWk9vbB0GtTuEavTdmWoj:n/i/v3kQhJhDRbB5tCE6Tej
Malware Config
Signatures
-
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Software\Wine 10250490eae54ce8278f0fd7b76bf442.exe -
resource yara_rule behavioral2/memory/3732-2-0x0000000013140000-0x00000000138F9000-memory.dmp themida behavioral2/memory/3732-4-0x0000000013140000-0x00000000138F9000-memory.dmp themida behavioral2/memory/3732-5-0x0000000013140000-0x00000000138F9000-memory.dmp themida behavioral2/memory/3732-6-0x0000000013140000-0x00000000138F9000-memory.dmp themida -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5108 set thread context of 3732 5108 10250490eae54ce8278f0fd7b76bf442.exe 32 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5108 10250490eae54ce8278f0fd7b76bf442.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 5108 wrote to memory of 3732 5108 10250490eae54ce8278f0fd7b76bf442.exe 32 PID 5108 wrote to memory of 3732 5108 10250490eae54ce8278f0fd7b76bf442.exe 32 PID 5108 wrote to memory of 3732 5108 10250490eae54ce8278f0fd7b76bf442.exe 32 PID 5108 wrote to memory of 3732 5108 10250490eae54ce8278f0fd7b76bf442.exe 32 PID 5108 wrote to memory of 3732 5108 10250490eae54ce8278f0fd7b76bf442.exe 32 PID 5108 wrote to memory of 3732 5108 10250490eae54ce8278f0fd7b76bf442.exe 32 PID 5108 wrote to memory of 3732 5108 10250490eae54ce8278f0fd7b76bf442.exe 32 PID 5108 wrote to memory of 3732 5108 10250490eae54ce8278f0fd7b76bf442.exe 32 PID 5108 wrote to memory of 3732 5108 10250490eae54ce8278f0fd7b76bf442.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\10250490eae54ce8278f0fd7b76bf442.exe"C:\Users\Admin\AppData\Local\Temp\10250490eae54ce8278f0fd7b76bf442.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Users\Admin\AppData\Local\Temp\10250490eae54ce8278f0fd7b76bf442.exeC:\Users\Admin\AppData\Local\Temp\10250490eae54ce8278f0fd7b76bf442.exe2⤵
- Identifies Wine through registry keys
PID:3732
-