Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 13:49
Static task
static1
Behavioral task
behavioral1
Sample
38a656a65faaf82113839d53463393d9.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
38a656a65faaf82113839d53463393d9.exe
Resource
win10v2004-20231222-en
General
-
Target
38a656a65faaf82113839d53463393d9.exe
-
Size
4.7MB
-
MD5
38a656a65faaf82113839d53463393d9
-
SHA1
39ac94cea70a3c6aadbefd09b5faac1a4f3c5dff
-
SHA256
dd2c67a081a872567905dc8f187cb35107354f7c3bec793567bb27551288d6bb
-
SHA512
996ed9cee525be8b7319bf97c2ccd20eaa6a7db46167936aa0a1257d44aaf2721b1c056484d885ec67ecdfe116b966bf36df2f489b1c53d8c8d59d88a079dc70
-
SSDEEP
98304:K22UNb1yyiM/ySDVd8QwylIJC03RGdKyACPttcW3q4:K2T1yydj8klIJ/3mKyAat63
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Wapp = "C:\\Arquivos de programas\\Wapp.exe" 38a656a65faaf82113839d53463393d9.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Menu Iniciar\Iniciar\Wapp.exe 38a656a65faaf82113839d53463393d9.exe File created C:\WINDOWS\system\Next.txt 38a656a65faaf82113839d53463393d9.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2580 schtasks.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2804 38a656a65faaf82113839d53463393d9.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2804 wrote to memory of 2580 2804 38a656a65faaf82113839d53463393d9.exe 20 PID 2804 wrote to memory of 2580 2804 38a656a65faaf82113839d53463393d9.exe 20 PID 2804 wrote to memory of 2580 2804 38a656a65faaf82113839d53463393d9.exe 20
Processes
-
C:\Users\Admin\AppData\Local\Temp\38a656a65faaf82113839d53463393d9.exe"C:\Users\Admin\AppData\Local\Temp\38a656a65faaf82113839d53463393d9.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn startt /tr c:\autoexec.bat /sc onstart /ru system2⤵
- Creates scheduled task(s)
PID:2580
-