Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
87s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 06:13
Static task
static1
Behavioral task
behavioral1
Sample
2b5cff0897686a2750f8761c64a5555f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2b5cff0897686a2750f8761c64a5555f.exe
Resource
win10v2004-20231222-en
General
-
Target
2b5cff0897686a2750f8761c64a5555f.exe
-
Size
15KB
-
MD5
2b5cff0897686a2750f8761c64a5555f
-
SHA1
dc65cf46526c5b04f2c1bab0bceb413c35f1f7f4
-
SHA256
9996b1329a7f71432e25b092cbc77a162344c2531f222bba96add176ad3c83c0
-
SHA512
5a6bfd83a40aafc038d8ca969e325b72b3c6f8113ed4b50e07ae84d7cd406ee07cb5d2987f89ae33beb8185871d58d59d1720ae0a0ac3c8764d261c1227e4d5e
-
SSDEEP
384:NkqD50TkFdPiXWIn0lPybUI7vHLcbSYOHl:NGTkFdPGWIn0cN6l
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run alg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\lsass = "c:\\windows\\system\\alg.exe" alg.exe -
Executes dropped EXE 1 IoCs
pid Process 4260 alg.exe -
Loads dropped DLL 33 IoCs
pid Process 4260 alg.exe 4260 alg.exe 4260 alg.exe 4260 alg.exe 4260 alg.exe 4260 alg.exe 4260 alg.exe 4260 alg.exe 4260 alg.exe 4260 alg.exe 4260 alg.exe 4260 alg.exe 4260 alg.exe 4260 alg.exe 4260 alg.exe 4260 alg.exe 4260 alg.exe 4260 alg.exe 4260 alg.exe 4260 alg.exe 4260 alg.exe 4260 alg.exe 4260 alg.exe 4260 alg.exe 4260 alg.exe 4260 alg.exe 4260 alg.exe 4260 alg.exe 4260 alg.exe 4260 alg.exe 4260 alg.exe 4260 alg.exe 4260 alg.exe -
Drops file in Program Files directory 29 IoCs
description ioc Process File opened for modification \??\c:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrServicesUpdater.exe alg.exe File opened for modification \??\c:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\arh.exe alg.exe File opened for modification \??\c:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\WCChromeNativeMessagingHost.exe alg.exe File opened for modification \??\c:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\FullTrustNotifier.exe alg.exe File opened for modification \??\c:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\alg.exe alg.exe File opened for modification \??\c:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\ADelRCP.exe alg.exe File opened for modification \??\c:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\RCX52C7.tmp alg.exe File opened for modification \??\c:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RCX4FA7.tmp alg.exe File opened for modification \??\c:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\64BitMAPIBroker.exe alg.exe File created \??\c:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\alg.exe alg.exe File opened for modification \??\c:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\RCX5950.tmp alg.exe File opened for modification \??\c:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32Info.exe alg.exe File created \??\c:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\alg.exe alg.exe File opened for modification \??\c:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe alg.exe File opened for modification \??\c:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\RCX50D1.tmp alg.exe File opened for modification \??\c:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AdobeCollabSync.exe alg.exe File opened for modification \??\c:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\LogTransport2.exe alg.exe File opened for modification \??\c:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\32BitMAPIBroker.exe alg.exe File opened for modification \??\c:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\alg.exe alg.exe File opened for modification \??\c:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\alg.exe alg.exe File opened for modification \??\c:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\reader_sl.exe alg.exe File created \??\c:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\alg.exe alg.exe File opened for modification \??\c:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Eula.exe alg.exe File opened for modification \??\c:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\RCX514F.tmp alg.exe File opened for modification \??\c:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe alg.exe File opened for modification \??\c:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroTextExtractor.exe alg.exe File opened for modification \??\c:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\alg.exe alg.exe File opened for modification \??\c:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroBroker.exe alg.exe File created \??\c:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\alg.exe alg.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4952 wrote to memory of 4260 4952 2b5cff0897686a2750f8761c64a5555f.exe 23 PID 4952 wrote to memory of 4260 4952 2b5cff0897686a2750f8761c64a5555f.exe 23 PID 4952 wrote to memory of 4260 4952 2b5cff0897686a2750f8761c64a5555f.exe 23 PID 4260 wrote to memory of 4308 4260 alg.exe 16 PID 4260 wrote to memory of 4308 4260 alg.exe 16 PID 4260 wrote to memory of 4308 4260 alg.exe 16 PID 4952 wrote to memory of 5092 4952 2b5cff0897686a2750f8761c64a5555f.exe 22 PID 4952 wrote to memory of 5092 4952 2b5cff0897686a2750f8761c64a5555f.exe 22 PID 4952 wrote to memory of 5092 4952 2b5cff0897686a2750f8761c64a5555f.exe 22
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b5cff0897686a2750f8761c64a5555f.exe"C:\Users\Admin\AppData\Local\Temp\2b5cff0897686a2750f8761c64a5555f.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2B5CFF~1.EXE > nul2⤵PID:5092
-
-
\??\c:\windows\system\alg.exec:\windows\system\alg.exe2⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4260
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\temp\*.* /q /s1⤵PID:4308
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
303KB
MD5c37c71ede592e4a6feee2fc7aec4fd9e
SHA1fea5c8af4d38655fc513a6000c6b122afdf8581b
SHA256da151a2e011074add6106ed3ae03c1ee03f79228d1a160fc1956f6422f2857e5
SHA512de86844ec96dd01814a7f4d5287d74d6410ff942be3a466503c7ab9690ed4dfda8b0db9a1d29da40089054718cac58e39a86aed94bad1fa26adc5b71bc438eae
-
Filesize
93KB
MD519405c3a90ccb6c2b68a6163b71a93f5
SHA1f134788bf078dbc1e98855321560b5e1a63a7831
SHA2563ee9eaf9c337814f2cd793ec19ad076dc9b1a7df9b0b42c8bc1b588ee338b609
SHA512f8c33b3960a550c72cdf47ce88288a456aa67bca2b555b74a52a62ec1ac45e8541676d9a2ae12b53fa92c94f2845bddbf027f2e97e39dfae86d3521ecb4a0938
-
Filesize
122KB
MD516f564a785766172730440245b0140d5
SHA10eb715c86e16e183b9aeb4a8aa8a66c0a80e5396
SHA256271da500ecdc8c9dbab597625b2bbdf1f9ec7489b9d93a3490fa2e694da9f194
SHA5120984cafaede608c00c3117fbb75f00899f1a96be49010ac12c128ae49e290cfd1aa7a2180301054130766294ddba94638bfed2b9c9914d68ff98b669729db1e3
-
Filesize
92KB
MD5dca384871c637cc0764fe75205147c80
SHA103225f9cb5bddef4379b032195d5926956fb9927
SHA25618f37ee61d0bfaccd524800605065ddee29ac720b9ed25ec0efc1822bc90b2c9
SHA512357250f813e80086c639e7b57c9b807c27a81855a7691a66694c9089f1a95df8fe9fad8051cec3e5bb9ce9fbd1b8e9c8b5491031f94d2dd9303e2c63d0dcf414
-
Filesize
92KB
MD5906c00ee1393213655bc6f04df3adae5
SHA1f5a5746b2b4f7581a1022abb810b4535b477f96d
SHA2563df384856ccfdf1cf115342a3affbb47d43ee8db8f74bb362b8a619047a38100
SHA512abc27ef9be9c5eb815343c09f9910ae5fdb7315451dcd4136bccd7c4588bc028643759882d6b3be16ddaaccc06882d959527892f64b6ead21d48d18afc9f45f5
-
Filesize
381KB
MD56ebe3108a1c4d53579500b3e92998acb
SHA136f5a9ee3a55b9fa1be22782600cf9b4718304b4
SHA256c1a2f79b34cbecdacff4827c75d5afdef63b39d3435dea1b64272db493bfb4e9
SHA51295becc5153af4f0f4b4a346d1e3402c0617184111473d408e12b67836a2e7a1d2f6d7e8d8c5d85a316b34891629d91f057e71589054021f220e114de5a3c3841
-
Filesize
15KB
MD52b5cff0897686a2750f8761c64a5555f
SHA1dc65cf46526c5b04f2c1bab0bceb413c35f1f7f4
SHA2569996b1329a7f71432e25b092cbc77a162344c2531f222bba96add176ad3c83c0
SHA5125a6bfd83a40aafc038d8ca969e325b72b3c6f8113ed4b50e07ae84d7cd406ee07cb5d2987f89ae33beb8185871d58d59d1720ae0a0ac3c8764d261c1227e4d5e