Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
158s -
max time network
173s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 04:45
Static task
static1
Behavioral task
behavioral1
Sample
28b557cf7c7238b9af8a1f1c7e035a01.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
28b557cf7c7238b9af8a1f1c7e035a01.exe
Resource
win10v2004-20231215-en
General
-
Target
28b557cf7c7238b9af8a1f1c7e035a01.exe
-
Size
209KB
-
MD5
28b557cf7c7238b9af8a1f1c7e035a01
-
SHA1
c29b24c2840d4eb9215e2c90fe33a6f956ef11e3
-
SHA256
335a54a3b3e73bb29d44cb0188a1556d5a1490508de77793518c0a782eec109c
-
SHA512
57d18c3958bc111dc79d1954d533cc191de1841bdb52039a16bd69a9dff996af486969d78895c0205f4a6473ec4df927c36d996b42b4ef7b47d5893c0ff37cc7
-
SSDEEP
3072:gldA0eEdgNlgDv1BjDIVhnsRKwia3T3EdmTDdpo7lXkpbGeiaMtl2BU26C4XOQFs:gldA0h1jbjDPR4aD0dO3pbcaMlnZCT
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3524 u.dll 4360 mpress.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000_Classes\Local Settings calc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3544 OpenWith.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3308 wrote to memory of 4392 3308 28b557cf7c7238b9af8a1f1c7e035a01.exe 91 PID 3308 wrote to memory of 4392 3308 28b557cf7c7238b9af8a1f1c7e035a01.exe 91 PID 3308 wrote to memory of 4392 3308 28b557cf7c7238b9af8a1f1c7e035a01.exe 91 PID 4392 wrote to memory of 3524 4392 cmd.exe 92 PID 4392 wrote to memory of 3524 4392 cmd.exe 92 PID 4392 wrote to memory of 3524 4392 cmd.exe 92 PID 3524 wrote to memory of 4360 3524 u.dll 93 PID 3524 wrote to memory of 4360 3524 u.dll 93 PID 3524 wrote to memory of 4360 3524 u.dll 93 PID 4392 wrote to memory of 2896 4392 cmd.exe 94 PID 4392 wrote to memory of 2896 4392 cmd.exe 94 PID 4392 wrote to memory of 2896 4392 cmd.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\28b557cf7c7238b9af8a1f1c7e035a01.exe"C:\Users\Admin\AppData\Local\Temp\28b557cf7c7238b9af8a1f1c7e035a01.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\2B03.tmp\vir.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Users\Admin\AppData\Local\Temp\u.dllu.dll -bat vir.bat -save 28b557cf7c7238b9af8a1f1c7e035a01.exe.com -include s.dll -overwrite -nodelete3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Users\Admin\AppData\Local\Temp\343A.tmp\mpress.exe"C:\Users\Admin\AppData\Local\Temp\343A.tmp\mpress.exe" "C:\Users\Admin\AppData\Local\Temp\exe345A.tmp"4⤵
- Executes dropped EXE
PID:4360
-
-
-
C:\Windows\SysWOW64\calc.exeCALC.EXE3⤵
- Modifies registry class
PID:2896
-
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:3544
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5b5d5499762eec1f9769753794f16ae33
SHA1a7a691339b8e077bfeaba1f26c0ba6d885a0fbef
SHA256b80370e0db261d4783995870e39b533d843ca8813a784b0181c5b7a6ff854330
SHA5125f6be0c15d2e07dbd5211f8578301dfc860dea86afb1e3a3e8af9c6bf871a457f65db8c69c7f846aa05ddb9879fa75b64623b9e33973d936f2c9c02e63ddf118
-
Filesize
100KB
MD5e42b81b9636152c78ba480c1c47d3c7f
SHA166a2fca3925428ee91ad9df5b76b90b34d28e0f8
SHA2567c24c72439880e502be51da5d991b9b56a1af242b4eef4737f0f43b4a87546d2
SHA5124b2986106325c5c3fe11ab460f646d4740eb85252aa191f2b84e29901fac146d7a82e31c72d39c38a70277f78278621ee506d9da2681f5019cd64c7df85cff6e
-
Filesize
41KB
MD52962dfcac22070e3da981e1115397938
SHA109a2ddd77cc9265c1c9a3a0b3797ea5007e3bd28
SHA256d47a5a1f144a7b1a0267ec604f18238419a29402b4ef51f1b2165f346ef88951
SHA5128efe28ee9ba694a2cc010bb61736de3f7bc190c3656f814a700e9992391a174982fa21f16d24ce1c36876e095f1a76569183cee52048ae22102cac621beb422a
-
Filesize
24KB
MD5b799e4b3cff5cefeb8355cff4153f617
SHA1cf39041f0b03033f148329b62c2f593ffb3ce8cc
SHA256e6f5642d95d82404f0c87ce3b455c662ad247d533cc01b0f454d194b244207c4
SHA51262e28c9cf91fd311d2dee021062a92eacf482455842a6f835afedfb368d84de089569ae032a37c85c05c4cc20d1e1aeeda2cda6e673fa42e00b80b19974b9f63
-
Filesize
700KB
MD503e84bf7ea2eba6e881e868ceefe2526
SHA109019ed20cf16847a264f5d1840ee0802f1778a6
SHA2568b16836b18106d0e8fdbb4b26beefee04479fe219a59cc2a186b68db91fcd832
SHA51232a47a7b4725f2d71573ad855b0a3bc99b3fa86d70f7b1b60456361bbcd03d37ea58f2b7092c0b6993e156db4ddd66b1d544363523f580a6dd8c055697ec2026
-
Filesize
2KB
MD5938c53189f97d1e84a6ad473c89c8677
SHA1f2aa832525553ad1fddd7d4eeaccb7c04be3a434
SHA2562c7994b20a27aa566fc48d3d52a9817ab4df2f291fb6d7547639bc1ac6a984ae
SHA5129d6f5096a01b721b312144d94ff8d169db1d510be32a648b28807c95704eab8cc74a0c121aa5c47d056de1507390c37bfc9cc8c81965774df4512c1a9909b35e