Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 10:52
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1675e3019087826c1ae5dfb2792fe4d4.exe
Resource
win7-20231129-en
4 signatures
150 seconds
General
-
Target
1675e3019087826c1ae5dfb2792fe4d4.exe
-
Size
876KB
-
MD5
1675e3019087826c1ae5dfb2792fe4d4
-
SHA1
7b1371b6ce33ecbdd17be93f78f2f79957e65c13
-
SHA256
3d804529e96ce0f02bd6836edb6e2e369cf489780f919474a3738b5356a36033
-
SHA512
86ac712e8f255010156efaf2c8ac74296370e20023df11db66f8f78a3acc8cc7aa3f8ff7d52ba5a83528e64410768126f67c3d79be6b6ac452fffcbda8d0acb2
-
SSDEEP
24576:ICMLKmtvPyHu7iqNd2rmy9pNg4W7HMLG3bOAHCJJkr:tiKmHyOfUrYp7s8Lr
Malware Config
Signatures
-
Loads dropped DLL 6 IoCs
pid Process 4760 1675e3019087826c1ae5dfb2792fe4d4.exe 4760 1675e3019087826c1ae5dfb2792fe4d4.exe 4760 1675e3019087826c1ae5dfb2792fe4d4.exe 4760 1675e3019087826c1ae5dfb2792fe4d4.exe 4760 1675e3019087826c1ae5dfb2792fe4d4.exe 4760 1675e3019087826c1ae5dfb2792fe4d4.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 1675e3019087826c1ae5dfb2792fe4d4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1848 wrote to memory of 4480 1848 1675e3019087826c1ae5dfb2792fe4d4.exe 22 PID 1848 wrote to memory of 4480 1848 1675e3019087826c1ae5dfb2792fe4d4.exe 22 PID 1848 wrote to memory of 4480 1848 1675e3019087826c1ae5dfb2792fe4d4.exe 22 PID 4480 wrote to memory of 4760 4480 1675e3019087826c1ae5dfb2792fe4d4.exe 21 PID 4480 wrote to memory of 4760 4480 1675e3019087826c1ae5dfb2792fe4d4.exe 21 PID 4480 wrote to memory of 4760 4480 1675e3019087826c1ae5dfb2792fe4d4.exe 21
Processes
-
C:\Users\Admin\AppData\Local\Temp\1675e3019087826c1ae5dfb2792fe4d4.exe"C:\Users\Admin\AppData\Local\Temp\1675e3019087826c1ae5dfb2792fe4d4.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Users\Admin\AppData\Local\Temp\1675e3019087826c1ae5dfb2792fe4d4.exe"C:\Users\Admin\AppData\Local\Temp\1675e3019087826c1ae5dfb2792fe4d4.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4480
-
-
C:\Users\Admin\AppData\Local\Temp\1675e3019087826c1ae5dfb2792fe4d4.exe"C:\Users\Admin\AppData\Local\Temp\1675e3019087826c1ae5dfb2792fe4d4.exe"1⤵
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4760