Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
158s -
max time network
186s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 02:38
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
24c6c25e1293b9ee5088ee2bed04ce16.exe
Resource
win7-20231215-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
24c6c25e1293b9ee5088ee2bed04ce16.exe
Resource
win10v2004-20231215-en
3 signatures
150 seconds
General
-
Target
24c6c25e1293b9ee5088ee2bed04ce16.exe
-
Size
166KB
-
MD5
24c6c25e1293b9ee5088ee2bed04ce16
-
SHA1
01518a363603bce4aa4fbced71497f3a71a04dbe
-
SHA256
0413487aa799f62e05d13968ebdf59f0bf02af8ef88284a67aff704c033a265a
-
SHA512
c9a41d458fb9abd52b2c0486ea6fa0c6487bd8963c5213e1464a43bc3d0f4ac0d9315173932ad22d52f0808d5b7ab309070f23cf42b7834e95ca49b62cf4ab9f
-
SSDEEP
3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/k85:o68i3odBiTl2+TCU/Z
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft I Service = "C:\\Windows\\winhash_up.exe /REGstart" 24c6c25e1293b9ee5088ee2bed04ce16.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\SHARE_TEMP\Icon2.ico 24c6c25e1293b9ee5088ee2bed04ce16.exe File created C:\Windows\SHARE_TEMP\Icon3.ico 24c6c25e1293b9ee5088ee2bed04ce16.exe File created C:\Windows\SHARE_TEMP\Icon7.ico 24c6c25e1293b9ee5088ee2bed04ce16.exe File created C:\Windows\SHARE_TEMP\Icon10.ico 24c6c25e1293b9ee5088ee2bed04ce16.exe File created C:\Windows\SHARE_TEMP\Icon14.ico 24c6c25e1293b9ee5088ee2bed04ce16.exe File created C:\Windows\winhash_up.exez 24c6c25e1293b9ee5088ee2bed04ce16.exe File opened for modification C:\Windows\winhash_up.exez 24c6c25e1293b9ee5088ee2bed04ce16.exe File created C:\Windows\SHARE_TEMP\Icon6.ico 24c6c25e1293b9ee5088ee2bed04ce16.exe File created C:\Windows\SHARE_TEMP\Icon12.ico 24c6c25e1293b9ee5088ee2bed04ce16.exe File created C:\Windows\bugMAKER.bat 24c6c25e1293b9ee5088ee2bed04ce16.exe File created C:\Windows\winhash_up.exe 24c6c25e1293b9ee5088ee2bed04ce16.exe File created C:\Windows\SHARE_TEMP\Icon5.ico 24c6c25e1293b9ee5088ee2bed04ce16.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4240 wrote to memory of 4008 4240 24c6c25e1293b9ee5088ee2bed04ce16.exe 93 PID 4240 wrote to memory of 4008 4240 24c6c25e1293b9ee5088ee2bed04ce16.exe 93 PID 4240 wrote to memory of 4008 4240 24c6c25e1293b9ee5088ee2bed04ce16.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\24c6c25e1293b9ee5088ee2bed04ce16.exe"C:\Users\Admin\AppData\Local\Temp\24c6c25e1293b9ee5088ee2bed04ce16.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\bugMAKER.bat2⤵PID:4008
-