Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 00:34
Static task
static1
Behavioral task
behavioral1
Sample
21e3c9cebb346add379aeadf2d539c43.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
21e3c9cebb346add379aeadf2d539c43.exe
Resource
win10v2004-20231222-en
General
-
Target
21e3c9cebb346add379aeadf2d539c43.exe
-
Size
375KB
-
MD5
21e3c9cebb346add379aeadf2d539c43
-
SHA1
217c41d654c2c8ab4ef425a86fdd0ee961c08328
-
SHA256
e4eecda3c8f76851e33d2de079e63477ede14b6eb6e2511b141eef808f55a61d
-
SHA512
ee972b6b6d15a1d94f3c38f50074f498491351e683251e9519b4c6f970de2d0b9655b8536c01de16bba80e0e71d9f95b694f5ea0beb22a32105c816500f44b6b
-
SSDEEP
6144:8UvbxY2cqs+Iu6TzJQVW8MNkLo93utmTGlgWRx/:pG2wuVjQkLo9M+ggWRx
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 5100 9xdff4MPF.exe -
Executes dropped EXE 2 IoCs
pid Process 4700 9xdff4MPF.exe 5100 9xdff4MPF.exe -
Loads dropped DLL 4 IoCs
pid Process 1160 21e3c9cebb346add379aeadf2d539c43.exe 1160 21e3c9cebb346add379aeadf2d539c43.exe 5100 9xdff4MPF.exe 5100 9xdff4MPF.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\EXDEr1G2UO6e9y = "C:\\ProgramData\\J7jTCxCwxvy\\9xdff4MPF.exe" 21e3c9cebb346add379aeadf2d539c43.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1116 set thread context of 1160 1116 21e3c9cebb346add379aeadf2d539c43.exe 25 PID 4700 set thread context of 5100 4700 9xdff4MPF.exe 30 PID 5100 set thread context of 4704 5100 9xdff4MPF.exe 54 -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1116 wrote to memory of 1160 1116 21e3c9cebb346add379aeadf2d539c43.exe 25 PID 1116 wrote to memory of 1160 1116 21e3c9cebb346add379aeadf2d539c43.exe 25 PID 1116 wrote to memory of 1160 1116 21e3c9cebb346add379aeadf2d539c43.exe 25 PID 1116 wrote to memory of 1160 1116 21e3c9cebb346add379aeadf2d539c43.exe 25 PID 1116 wrote to memory of 1160 1116 21e3c9cebb346add379aeadf2d539c43.exe 25 PID 1160 wrote to memory of 4700 1160 21e3c9cebb346add379aeadf2d539c43.exe 29 PID 1160 wrote to memory of 4700 1160 21e3c9cebb346add379aeadf2d539c43.exe 29 PID 1160 wrote to memory of 4700 1160 21e3c9cebb346add379aeadf2d539c43.exe 29 PID 4700 wrote to memory of 5100 4700 9xdff4MPF.exe 30 PID 4700 wrote to memory of 5100 4700 9xdff4MPF.exe 30 PID 4700 wrote to memory of 5100 4700 9xdff4MPF.exe 30 PID 4700 wrote to memory of 5100 4700 9xdff4MPF.exe 30 PID 4700 wrote to memory of 5100 4700 9xdff4MPF.exe 30 PID 5100 wrote to memory of 4704 5100 9xdff4MPF.exe 54 PID 5100 wrote to memory of 4704 5100 9xdff4MPF.exe 54 PID 5100 wrote to memory of 4704 5100 9xdff4MPF.exe 54 PID 5100 wrote to memory of 4704 5100 9xdff4MPF.exe 54 PID 5100 wrote to memory of 4704 5100 9xdff4MPF.exe 54
Processes
-
C:\Users\Admin\AppData\Local\Temp\21e3c9cebb346add379aeadf2d539c43.exe"C:\Users\Admin\AppData\Local\Temp\21e3c9cebb346add379aeadf2d539c43.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Users\Admin\AppData\Local\Temp\21e3c9cebb346add379aeadf2d539c43.exe"C:\Users\Admin\AppData\Local\Temp\21e3c9cebb346add379aeadf2d539c43.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\ProgramData\J7jTCxCwxvy\9xdff4MPF.exe"C:\ProgramData\J7jTCxCwxvy\9xdff4MPF.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\ProgramData\J7jTCxCwxvy\9xdff4MPF.exe"C:\ProgramData\J7jTCxCwxvy\9xdff4MPF.exe"4⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe"C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe" /i:51005⤵PID:4704
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD512ef8faa4741282047c16221adbea4fd
SHA19e9038cf865886bfb8b255ef3098e4792c779692
SHA2567158325fb9bf40a8f46c8dd20dd9a775e831b0ebf0e25dfd52708ae5b7ba716f
SHA51244f0bf911f5aebc883dcefcae2be27c99c62d24a4cea5921453550003860e1837d46b3f1e7256f512d6f360ab1f9e70f0c90db706c70cbb173d0161145ec4908