Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
13s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 07:43
Behavioral task
behavioral1
Sample
1273e6b2f68c1be047a6e1e3c2471e41.exe
Resource
win7-20231215-en
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
1273e6b2f68c1be047a6e1e3c2471e41.exe
Resource
win10v2004-20231215-en
6 signatures
150 seconds
General
-
Target
1273e6b2f68c1be047a6e1e3c2471e41.exe
-
Size
10KB
-
MD5
1273e6b2f68c1be047a6e1e3c2471e41
-
SHA1
8c2c47b73cf18571a8c961e3d5e2b81ed487e37b
-
SHA256
5acc6b81f60d552e955f4cb4e1fb825340bf75ac0923730eaff532aecd7689d8
-
SHA512
022cd6198becbae4c0b5bab85cba5bd8ce26909dfa8014e1a97b9b92a8791133fc15dc77b3ede142abb5316929fc1d6c71437238b47fc931022946cb199f815e
-
SSDEEP
192:Ryvj2H5QwZPhoMVBAbWPFO3+3y2El/mGBx27D7IgOGB/DO4E7T3Z:IyH5Qi5zAbWtGIOuOa/q4ut
Score
8/10
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 4972 xpsbosk.exe -
resource yara_rule behavioral2/memory/4596-0-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral2/memory/4972-6-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral2/memory/4596-9-0x0000000000400000-0x000000000040E000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\xpsbosk.exe 1273e6b2f68c1be047a6e1e3c2471e41.exe File opened for modification C:\Windows\SysWOW64\xpsbosk.exe 1273e6b2f68c1be047a6e1e3c2471e41.exe File created C:\Windows\SysWOW64\xpsbos.dll 1273e6b2f68c1be047a6e1e3c2471e41.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4596 1273e6b2f68c1be047a6e1e3c2471e41.exe 4596 1273e6b2f68c1be047a6e1e3c2471e41.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4596 wrote to memory of 4972 4596 1273e6b2f68c1be047a6e1e3c2471e41.exe 92 PID 4596 wrote to memory of 4972 4596 1273e6b2f68c1be047a6e1e3c2471e41.exe 92 PID 4596 wrote to memory of 4972 4596 1273e6b2f68c1be047a6e1e3c2471e41.exe 92 PID 4596 wrote to memory of 1500 4596 1273e6b2f68c1be047a6e1e3c2471e41.exe 94 PID 4596 wrote to memory of 1500 4596 1273e6b2f68c1be047a6e1e3c2471e41.exe 94 PID 4596 wrote to memory of 1500 4596 1273e6b2f68c1be047a6e1e3c2471e41.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\1273e6b2f68c1be047a6e1e3c2471e41.exe"C:\Users\Admin\AppData\Local\Temp\1273e6b2f68c1be047a6e1e3c2471e41.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Windows\SysWOW64\xpsbosk.exeC:\Windows\system32\xpsbosk.exe ˜‰2⤵
- Executes dropped EXE
PID:4972
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\1273e6b2f68c1be047a6e1e3c2471e41.exe.bat2⤵PID:1500
-