Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    0s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/12/2023, 02:44

General

  • Target

    24f951dcaa2809ecb6f035cb0b12aafa.exe

  • Size

    623KB

  • MD5

    24f951dcaa2809ecb6f035cb0b12aafa

  • SHA1

    2f4b4437d6d1673338314690f26f0e7da5967c0a

  • SHA256

    1a87451a85c7b827c7f96c67dd9e1ba412677fa0037611699ce36b2781308de2

  • SHA512

    541f865daa0c16d094813b15caea91f1056c0981e74b13652b2984ecb3dd5b4f1d62e84c333fbf7db53c2aef3439ba21a2e25a4c9e4611bb317aed7c7105c1bd

  • SSDEEP

    12288:W/pmxj3G/wxxAeFSZMCM2cjnt+m/SS2qzjqWiaiueAQPfXUlJdmklY:W/gxj0OxAeFvCIn0mAqHHbQPf0dmke

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 21 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\24f951dcaa2809ecb6f035cb0b12aafa.exe
    "C:\Users\Admin\AppData\Local\Temp\24f951dcaa2809ecb6f035cb0b12aafa.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:4328
    • C:\Users\Admin\AppData\Local\Temp\1430881320.exe
      C:\Users\Admin\AppData\Local\Temp\1430881320.exe 6|8|2|4|5|8|4|9|1|1|8 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
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3540
  • C:\Windows\SysWOW64\Wbem\wmic.exe
    wmic /output:C:\Users\Admin\AppData\Local\Temp\81704438212.txt bios get serialnumber
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2192
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3540 -ip 3540
    1⤵
      PID:4472
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3540 -s 916
      1⤵
      • Program crash
      PID:2052
    • C:\Windows\SysWOW64\Wbem\wmic.exe
      wmic /output:C:\Users\Admin\AppData\Local\Temp\81704438212.txt bios get version
      1⤵
        PID:1668
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81704438212.txt bios get version
        1⤵
          PID:1676
        • C:\Windows\SysWOW64\Wbem\wmic.exe
          wmic /output:C:\Users\Admin\AppData\Local\Temp\81704438212.txt bios get version
          1⤵
            PID:2172
          • C:\Windows\SysWOW64\Wbem\wmic.exe
            wmic /output:C:\Users\Admin\AppData\Local\Temp\81704438212.txt bios get version
            1⤵
              PID:1308

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads