Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
01/01/2024, 11:51
Behavioral task
behavioral1
Sample
048419f17e2700b03e19e38f06308904a81c2dda648c6c5f4d25e97d32f7dbc0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
048419f17e2700b03e19e38f06308904a81c2dda648c6c5f4d25e97d32f7dbc0.exe
Resource
win10v2004-20231222-en
General
-
Target
048419f17e2700b03e19e38f06308904a81c2dda648c6c5f4d25e97d32f7dbc0.exe
-
Size
536KB
-
MD5
8c718800cbf92a2ac8bad76b03211ec9
-
SHA1
5499efdb2e6bfdbc9bc12a5927e87eeb1defb522
-
SHA256
048419f17e2700b03e19e38f06308904a81c2dda648c6c5f4d25e97d32f7dbc0
-
SHA512
2bb118a2550483b184dd273cd4d62015a8a272bec90fd002dde0abfd334107242a96a2c20fb4da7bdb04afbdd76eb9cfee6651af9481c2daa49e3198c350e3ef
-
SSDEEP
12288:Rhf0Bs9bDDq9hu53Ltp/p+gPhhwPOaoTJRkmOkx2LIa:RdQyDL9xp/BGA1RkmOkx2LF
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4032-0-0x0000000000ED0000-0x0000000000FD2000-memory.dmp upx behavioral2/memory/4032-13-0x0000000000ED0000-0x0000000000FD2000-memory.dmp upx behavioral2/memory/4032-20-0x0000000000ED0000-0x0000000000FD2000-memory.dmp upx behavioral2/memory/4032-26-0x0000000000ED0000-0x0000000000FD2000-memory.dmp upx behavioral2/memory/4032-29-0x0000000000ED0000-0x0000000000FD2000-memory.dmp upx behavioral2/memory/4032-33-0x0000000000ED0000-0x0000000000FD2000-memory.dmp upx behavioral2/memory/4032-38-0x0000000000ED0000-0x0000000000FD2000-memory.dmp upx -
Unexpected DNS network traffic destination 4 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 223.5.5.5 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 223.5.5.5 -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\450780 048419f17e2700b03e19e38f06308904a81c2dda648c6c5f4d25e97d32f7dbc0.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4032 048419f17e2700b03e19e38f06308904a81c2dda648c6c5f4d25e97d32f7dbc0.exe 4032 048419f17e2700b03e19e38f06308904a81c2dda648c6c5f4d25e97d32f7dbc0.exe 4032 048419f17e2700b03e19e38f06308904a81c2dda648c6c5f4d25e97d32f7dbc0.exe 4032 048419f17e2700b03e19e38f06308904a81c2dda648c6c5f4d25e97d32f7dbc0.exe 4032 048419f17e2700b03e19e38f06308904a81c2dda648c6c5f4d25e97d32f7dbc0.exe 4032 048419f17e2700b03e19e38f06308904a81c2dda648c6c5f4d25e97d32f7dbc0.exe 4032 048419f17e2700b03e19e38f06308904a81c2dda648c6c5f4d25e97d32f7dbc0.exe 4032 048419f17e2700b03e19e38f06308904a81c2dda648c6c5f4d25e97d32f7dbc0.exe 3404 Explorer.EXE 3404 Explorer.EXE 3404 Explorer.EXE 3404 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 4032 048419f17e2700b03e19e38f06308904a81c2dda648c6c5f4d25e97d32f7dbc0.exe Token: SeTcbPrivilege 4032 048419f17e2700b03e19e38f06308904a81c2dda648c6c5f4d25e97d32f7dbc0.exe Token: SeDebugPrivilege 4032 048419f17e2700b03e19e38f06308904a81c2dda648c6c5f4d25e97d32f7dbc0.exe Token: SeDebugPrivilege 3404 Explorer.EXE Token: SeTcbPrivilege 3404 Explorer.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4032 wrote to memory of 3404 4032 048419f17e2700b03e19e38f06308904a81c2dda648c6c5f4d25e97d32f7dbc0.exe 47 PID 4032 wrote to memory of 3404 4032 048419f17e2700b03e19e38f06308904a81c2dda648c6c5f4d25e97d32f7dbc0.exe 47 PID 4032 wrote to memory of 3404 4032 048419f17e2700b03e19e38f06308904a81c2dda648c6c5f4d25e97d32f7dbc0.exe 47
Processes
-
C:\Users\Admin\AppData\Local\Temp\048419f17e2700b03e19e38f06308904a81c2dda648c6c5f4d25e97d32f7dbc0.exe"C:\Users\Admin\AppData\Local\Temp\048419f17e2700b03e19e38f06308904a81c2dda648c6c5f4d25e97d32f7dbc0.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4032
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3404