Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
157s -
max time network
168s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 13:46
Static task
static1
Behavioral task
behavioral1
Sample
38918f603b2e2bb4c09e69bc5f98cb71.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
38918f603b2e2bb4c09e69bc5f98cb71.exe
Resource
win10v2004-20231215-en
General
-
Target
38918f603b2e2bb4c09e69bc5f98cb71.exe
-
Size
109KB
-
MD5
38918f603b2e2bb4c09e69bc5f98cb71
-
SHA1
3d86e656d996a13921e79996dc6bd9e8c31ba93b
-
SHA256
8b143062ebc9e1dfbbdfd1a7a24eb88c2637294e15aa26d9c65b23e95f257eeb
-
SHA512
a326a0fe964cec626341aac47221036abc04a1c999d1a7f4e5634daacec0c67976f2397e051ec34beb7d4fac16ba1cb765d6cb701ed512bc7d67a7d91919a833
-
SSDEEP
3072:b+CLQALA6QggKEtEDxrg6hetSd397s60IVW:Kq1LA6SrIrg6Ao39/
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1460 rundll32.exe -
Loads dropped DLL 3 IoCs
pid Process 3232 38918f603b2e2bb4c09e69bc5f98cb71.exe 3232 38918f603b2e2bb4c09e69bc5f98cb71.exe 1460 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\isptr = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\isptr.dll\",LoadMeshFromXInMemory" 38918f603b2e2bb4c09e69bc5f98cb71.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3232 38918f603b2e2bb4c09e69bc5f98cb71.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3232 wrote to memory of 1460 3232 38918f603b2e2bb4c09e69bc5f98cb71.exe 93 PID 3232 wrote to memory of 1460 3232 38918f603b2e2bb4c09e69bc5f98cb71.exe 93 PID 3232 wrote to memory of 1460 3232 38918f603b2e2bb4c09e69bc5f98cb71.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\38918f603b2e2bb4c09e69bc5f98cb71.exe"C:\Users\Admin\AppData\Local\Temp\38918f603b2e2bb4c09e69bc5f98cb71.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\isptr.dll",LoadMemory2⤵
- Deletes itself
- Loads dropped DLL
PID:1460
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD58597feaaea4fb3e4a29ff6816b2f8c22
SHA1c4755a8a4ce0950e73dbc810993371c35bcd7ff4
SHA2560388fed6e5b4b19628a876632d628e1abd65618ac4a402c8a096c5406c3c0e7d
SHA512e1f8e25737bf8b414bd2981f9a1713c8a032b6580f2b1e7a23c05f7d7629e241a22e8e954b3a4267c29e9fdee75d69c7891128883204f55e784a4feee84afc3a
-
Filesize
48KB
MD5c60557243bb0e9a1925d4432465e2a9b
SHA167b11d95a0336e49943603d265baf12d712166e4
SHA256441d249f3ae3eb26b535f842652a08700623ec3b127f4f356c02ec47b6ceaea4
SHA5124721cdf49d6b6e2b11b11be0e35ba286819662a5046e55e864169c594ee99aef037f336917e64634e69b6c4cbf9583c4ce95fd9507ada4bb84eace84e6b15b77
-
Filesize
66KB
MD50091b22a27f93a1176f353591032e753
SHA14f59831c7dde20e704f6b8595cefbfac2544f730
SHA2567454abad0a05706f2131f35f907fa575dd7efdec5c458dd24690ee6c66d88ba7
SHA51246eb370a235937b3e49b697b4dd4a8dddf00f15a0f304b01550eaae7dab9aba102d0f6489963352e7d81c79b4272bedc59dab73b8fc618126f6f4cba451edd8b
-
Filesize
69KB
MD577ce6574986b85dbb323b00499f1e472
SHA1b4543b68d6457bf88bffa095ae5b9dd8ccc74cb8
SHA25615829950863a61c3d5dfc568d7b6b9004a7b38f3a8951a12534bc8bdce2c44c5
SHA51278ffc4839607d46330ba7de17602e91f5436118b4bcb7015165d2c43d9e1a31f2d44dcc6f069b0521cd544ad81ccbc1d5b5e65d3220a688c45d22e5970768687
-
Filesize
109KB
MD5b7b31f12bc81ef5cab528c0e3da6bdfe
SHA17d7fd6d9e73213d51de76e6764bc377bc612b03b
SHA25660baea2d41afd8d5249a267fb44ac40d4be7a253c6fc4e1450c27bcfe1cf9b99
SHA51278efe660ef5ec230ad0174749f11e6fa07c1f46f8bc263081ca97830142da386582d246c187a5b73bcc5299f6bc2d44d31708336da470dc1b84eed53ea989f62