Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
169s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 06:19
Behavioral task
behavioral1
Sample
2b81aee1f38e29a7e768e474afc076be.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2b81aee1f38e29a7e768e474afc076be.exe
Resource
win10v2004-20231215-en
General
-
Target
2b81aee1f38e29a7e768e474afc076be.exe
-
Size
214KB
-
MD5
2b81aee1f38e29a7e768e474afc076be
-
SHA1
5460a3d5b43f31d7aad68ca9dfc394d931f3bae5
-
SHA256
68c39f0c9f3a6cb37e76df88bfa5f7676d5c6c1d07aa1bd97d13acb3c7329928
-
SHA512
f8e9a5dbad1bd477334daa262a83092af594f09984e53b08149dfd0468f14a0a57cdff4d4ed76a8703248c9f0e2b8c12938178180ad60200ced3e8a1d207e148
-
SSDEEP
6144:QpQ93B7KnYyed+W5bZ9jmtMVosxIh7S3SDxMBQdq:QGn86bZ9jmyGsuhUSDxX
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3472-0-0x0000000000400000-0x0000000000494000-memory.dmp upx behavioral2/memory/3472-1-0x0000000000400000-0x0000000000494000-memory.dmp upx behavioral2/memory/3472-3-0x0000000000400000-0x0000000000494000-memory.dmp upx behavioral2/memory/3472-6-0x0000000000400000-0x0000000000494000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\npcom.exe 2b81aee1f38e29a7e768e474afc076be.exe File created C:\Windows\SysWOW64\tsetup.exe 2b81aee1f38e29a7e768e474afc076be.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3472 wrote to memory of 4856 3472 2b81aee1f38e29a7e768e474afc076be.exe 96 PID 3472 wrote to memory of 4856 3472 2b81aee1f38e29a7e768e474afc076be.exe 96 PID 3472 wrote to memory of 4856 3472 2b81aee1f38e29a7e768e474afc076be.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b81aee1f38e29a7e768e474afc076be.exe"C:\Users\Admin\AppData\Local\Temp\2b81aee1f38e29a7e768e474afc076be.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 2b81aee1f38e29a7e768e474afc076be.bat2⤵PID:4856
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
163B
MD5f3047893dd19fb70688d42bc90d9cdcb
SHA1d780f8f28286774c9e23318b2ebf16d3ac76a610
SHA25631232ece1cf69af5d23f9f2cbce734a74364b90340946953333f2faa603b228b
SHA512b0b3e82df45f9e69a0fdadc6fde729702cb5ee78964501bc3ecac0ae3d52833dc65ab2302f6367e7b07f5bf4d3988e43524f3b01642bab7bbe97437161dfd1f4