Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 00:54
Behavioral task
behavioral1
Sample
224f72924adb6122ea30f01e0e7339a9.exe
Resource
win7-20231215-en
0 signatures
150 seconds
Behavioral task
behavioral2
Sample
224f72924adb6122ea30f01e0e7339a9.exe
Resource
win10v2004-20231215-en
8 signatures
150 seconds
General
-
Target
224f72924adb6122ea30f01e0e7339a9.exe
-
Size
58KB
-
MD5
224f72924adb6122ea30f01e0e7339a9
-
SHA1
a9f7b684c93dd088a3e2c87ff80caa360c174c4e
-
SHA256
f01a95a623841224e931cdecf76f3fe7a092188f5dddad743c943c1a7cc38904
-
SHA512
192b7841fbaa24a63ac9b29f392540add9d1a4ad7ed047976a18f8912dee17c98933a1a753b867acfb8dae850cdd97fe1fa4f71989b626cbe7e0fb7ab88f90b3
-
SSDEEP
1536:NVUzryTnxvA1KKl/Is5mds8AXb16zZHgnFOLcyR2QXm:vUzuxvLKNIt2Xx6xFjwQ2
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1092 224f72924adb6122ea30f01e0e7339a9.exe -
resource yara_rule behavioral2/memory/1880-0-0x0000000000400000-0x000000000041B000-memory.dmp upx behavioral2/memory/1880-20-0x0000000000400000-0x000000000041B000-memory.dmp upx behavioral2/memory/1092-15-0x0000000000400000-0x000000000041C000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\advllpd32.dll 224f72924adb6122ea30f01e0e7339a9.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1880 set thread context of 1092 1880 224f72924adb6122ea30f01e0e7339a9.exe 20 -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Progra~1\Common~1\Micros~1\SVCHOST.EXE 224f72924adb6122ea30f01e0e7339a9.exe File created C:\Progra~1\Common~1\Micros~1\obj.txt 224f72924adb6122ea30f01e0e7339a9.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\system32advllpd32.txt 224f72924adb6122ea30f01e0e7339a9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1880 wrote to memory of 1092 1880 224f72924adb6122ea30f01e0e7339a9.exe 20 PID 1880 wrote to memory of 1092 1880 224f72924adb6122ea30f01e0e7339a9.exe 20 PID 1880 wrote to memory of 1092 1880 224f72924adb6122ea30f01e0e7339a9.exe 20 PID 1880 wrote to memory of 1092 1880 224f72924adb6122ea30f01e0e7339a9.exe 20 PID 1880 wrote to memory of 1092 1880 224f72924adb6122ea30f01e0e7339a9.exe 20
Processes
-
C:\Users\Admin\AppData\Local\Temp\224f72924adb6122ea30f01e0e7339a9.exe"C:\Users\Admin\AppData\Local\Temp\224f72924adb6122ea30f01e0e7339a9.exe"1⤵
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Users\Admin\AppData\Local\Temp\224f72924adb6122ea30f01e0e7339a9.exeC:\Users\Admin\AppData\Local\Temp\224f72924adb6122ea30f01e0e7339a9.exe2⤵
- Executes dropped EXE
PID:1092
-