Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
228s -
max time network
299s -
platform
windows10-1703_x64 -
resource
win10-20231215-en -
resource tags
arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system -
submitted
01/01/2024, 05:01
Static task
static1
Behavioral task
behavioral1
Sample
af5cfa1a66edeb8cc4eae20824fe6b6b15d4955bef4bbe13750d8f9af424c49e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
af5cfa1a66edeb8cc4eae20824fe6b6b15d4955bef4bbe13750d8f9af424c49e.exe
Resource
win10-20231215-en
General
-
Target
af5cfa1a66edeb8cc4eae20824fe6b6b15d4955bef4bbe13750d8f9af424c49e.exe
-
Size
2.0MB
-
MD5
3eb4e7d99afa9e61d5fbcd4c42985220
-
SHA1
a67ca6138a9f0cfc70c3406c39e88b88567ff76b
-
SHA256
af5cfa1a66edeb8cc4eae20824fe6b6b15d4955bef4bbe13750d8f9af424c49e
-
SHA512
d704a96c7a32e713772497880d05f83fd5c6ef28f3a3e4da4b2de2dbaebf0505bdbd302b41aca3a326f10c8493101bc4b65fb073233c472c75d541bbceb9aff6
-
SSDEEP
49152:fBKsEZMOc1XTmPFoTqoSsFpoBVFSc00byphfNs4MexOH3k/9:fBtscWoSsFpoBVFSctSNSecH
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1696-1-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/1696-6-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/1696-7-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/1696-8-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/1696-4-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/1696-2-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/1696-13-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/1696-15-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/1696-16-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/1696-17-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/1696-18-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/1696-27-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/1696-30-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/1696-31-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/1696-35-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/1696-37-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/1696-38-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/1696-39-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/1696-43-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/1696-44-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/1696-45-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/1696-46-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/1696-48-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/1696-54-0x0000000000400000-0x0000000000848000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CSRSS = "\"C:\\ProgramData\\Drivers\\csrss.exe\"" af5cfa1a66edeb8cc4eae20824fe6b6b15d4955bef4bbe13750d8f9af424c49e.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4332 set thread context of 1696 4332 af5cfa1a66edeb8cc4eae20824fe6b6b15d4955bef4bbe13750d8f9af424c49e.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1696 af5cfa1a66edeb8cc4eae20824fe6b6b15d4955bef4bbe13750d8f9af424c49e.exe 1696 af5cfa1a66edeb8cc4eae20824fe6b6b15d4955bef4bbe13750d8f9af424c49e.exe 1696 af5cfa1a66edeb8cc4eae20824fe6b6b15d4955bef4bbe13750d8f9af424c49e.exe 1696 af5cfa1a66edeb8cc4eae20824fe6b6b15d4955bef4bbe13750d8f9af424c49e.exe 1696 af5cfa1a66edeb8cc4eae20824fe6b6b15d4955bef4bbe13750d8f9af424c49e.exe 1696 af5cfa1a66edeb8cc4eae20824fe6b6b15d4955bef4bbe13750d8f9af424c49e.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4332 wrote to memory of 1696 4332 af5cfa1a66edeb8cc4eae20824fe6b6b15d4955bef4bbe13750d8f9af424c49e.exe 21 PID 4332 wrote to memory of 1696 4332 af5cfa1a66edeb8cc4eae20824fe6b6b15d4955bef4bbe13750d8f9af424c49e.exe 21 PID 4332 wrote to memory of 1696 4332 af5cfa1a66edeb8cc4eae20824fe6b6b15d4955bef4bbe13750d8f9af424c49e.exe 21 PID 4332 wrote to memory of 1696 4332 af5cfa1a66edeb8cc4eae20824fe6b6b15d4955bef4bbe13750d8f9af424c49e.exe 21 PID 4332 wrote to memory of 1696 4332 af5cfa1a66edeb8cc4eae20824fe6b6b15d4955bef4bbe13750d8f9af424c49e.exe 21 PID 4332 wrote to memory of 1696 4332 af5cfa1a66edeb8cc4eae20824fe6b6b15d4955bef4bbe13750d8f9af424c49e.exe 21 PID 4332 wrote to memory of 1696 4332 af5cfa1a66edeb8cc4eae20824fe6b6b15d4955bef4bbe13750d8f9af424c49e.exe 21 PID 4332 wrote to memory of 1696 4332 af5cfa1a66edeb8cc4eae20824fe6b6b15d4955bef4bbe13750d8f9af424c49e.exe 21
Processes
-
C:\Users\Admin\AppData\Local\Temp\af5cfa1a66edeb8cc4eae20824fe6b6b15d4955bef4bbe13750d8f9af424c49e.exe"C:\Users\Admin\AppData\Local\Temp\af5cfa1a66edeb8cc4eae20824fe6b6b15d4955bef4bbe13750d8f9af424c49e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Users\Admin\AppData\Local\Temp\af5cfa1a66edeb8cc4eae20824fe6b6b15d4955bef4bbe13750d8f9af424c49e.exe"C:\Users\Admin\AppData\Local\Temp\af5cfa1a66edeb8cc4eae20824fe6b6b15d4955bef4bbe13750d8f9af424c49e.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:1696
-