Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
21s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 04:42
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
289fbc3010b9ea4ee489bfabb91d8a86.exe
Resource
win7-20231215-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
289fbc3010b9ea4ee489bfabb91d8a86.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
289fbc3010b9ea4ee489bfabb91d8a86.exe
-
Size
35KB
-
MD5
289fbc3010b9ea4ee489bfabb91d8a86
-
SHA1
31a84aa57c6541da4d673eae6967dcbf89ef8421
-
SHA256
aed639d9cb151f09aa01c1f05507fdf73a58da758f9b97002bee3c7e3a23676d
-
SHA512
73d6037ad02df0e54a944ef8bea83783d2243a73525f3c09f708bbe04a0c0e366b71e6f124899d63607c12da67a2b199e721c31d54340d0ef4eee3443a10d2d0
-
SSDEEP
768:PDA6yDT4PxJ2SlYeIX/MkoTmeSkCMlnYkzbiWz0:PDA6yDTyoSy5X/MxSklfzbiWg
Score
5/10
Malware Config
Signatures
-
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\vlstasx.exe 289fbc3010b9ea4ee489bfabb91d8a86.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\vlstasx.exe 289fbc3010b9ea4ee489bfabb91d8a86.exe File created C:\Windows\SysWOW64\vlstasx.exe 289fbc3010b9ea4ee489bfabb91d8a86.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 36 IoCs
pid Process 3472 289fbc3010b9ea4ee489bfabb91d8a86.exe 3472 289fbc3010b9ea4ee489bfabb91d8a86.exe 3472 289fbc3010b9ea4ee489bfabb91d8a86.exe 3472 289fbc3010b9ea4ee489bfabb91d8a86.exe 3472 289fbc3010b9ea4ee489bfabb91d8a86.exe 3472 289fbc3010b9ea4ee489bfabb91d8a86.exe 3472 289fbc3010b9ea4ee489bfabb91d8a86.exe 3472 289fbc3010b9ea4ee489bfabb91d8a86.exe 3472 289fbc3010b9ea4ee489bfabb91d8a86.exe 3472 289fbc3010b9ea4ee489bfabb91d8a86.exe 3472 289fbc3010b9ea4ee489bfabb91d8a86.exe 3472 289fbc3010b9ea4ee489bfabb91d8a86.exe 3472 289fbc3010b9ea4ee489bfabb91d8a86.exe 3472 289fbc3010b9ea4ee489bfabb91d8a86.exe 3472 289fbc3010b9ea4ee489bfabb91d8a86.exe 3472 289fbc3010b9ea4ee489bfabb91d8a86.exe 3472 289fbc3010b9ea4ee489bfabb91d8a86.exe 3472 289fbc3010b9ea4ee489bfabb91d8a86.exe 3472 289fbc3010b9ea4ee489bfabb91d8a86.exe 3472 289fbc3010b9ea4ee489bfabb91d8a86.exe 3472 289fbc3010b9ea4ee489bfabb91d8a86.exe 3472 289fbc3010b9ea4ee489bfabb91d8a86.exe 3472 289fbc3010b9ea4ee489bfabb91d8a86.exe 3472 289fbc3010b9ea4ee489bfabb91d8a86.exe 3472 289fbc3010b9ea4ee489bfabb91d8a86.exe 3472 289fbc3010b9ea4ee489bfabb91d8a86.exe 3472 289fbc3010b9ea4ee489bfabb91d8a86.exe 3472 289fbc3010b9ea4ee489bfabb91d8a86.exe 3472 289fbc3010b9ea4ee489bfabb91d8a86.exe 3472 289fbc3010b9ea4ee489bfabb91d8a86.exe 3472 289fbc3010b9ea4ee489bfabb91d8a86.exe 3472 289fbc3010b9ea4ee489bfabb91d8a86.exe 3472 289fbc3010b9ea4ee489bfabb91d8a86.exe 3472 289fbc3010b9ea4ee489bfabb91d8a86.exe 3472 289fbc3010b9ea4ee489bfabb91d8a86.exe 3472 289fbc3010b9ea4ee489bfabb91d8a86.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3472 wrote to memory of 2724 3472 289fbc3010b9ea4ee489bfabb91d8a86.exe 99 PID 3472 wrote to memory of 2724 3472 289fbc3010b9ea4ee489bfabb91d8a86.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\289fbc3010b9ea4ee489bfabb91d8a86.exe"C:\Users\Admin\AppData\Local\Temp\289fbc3010b9ea4ee489bfabb91d8a86.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Program Files\Internet Explorer\IEXPLORE.EXEOpen http://www.sky8000.com/sina/tongji.htm2⤵
- Modifies Internet Explorer settings
PID:2724 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2724 CREDAT:17410 /prefetch:23⤵PID:4884
-
-