Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
174s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
01/01/2024, 19:26
Static task
static1
Behavioral task
behavioral1
Sample
3dad32112b1187fdf27cf41caf6098cb.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3dad32112b1187fdf27cf41caf6098cb.exe
Resource
win10v2004-20231215-en
General
-
Target
3dad32112b1187fdf27cf41caf6098cb.exe
-
Size
1.1MB
-
MD5
3dad32112b1187fdf27cf41caf6098cb
-
SHA1
dd893498cd93cfe96dfcd99ce7bfd3b1ff90e313
-
SHA256
24cca7c825646ffc033635f13edd9ec2fb1ebbc4f980241855e904efd55c8a5f
-
SHA512
f89c055bda171e1a7390308f87daac1bafb4180204a1f320ff7752afbe7689eb76aea09b1dd9c4b5e4102cc9a1166e2a93c6563ed2289f6aa12fe9e1024837c3
-
SSDEEP
24576:wWvknOMEfo6Zx5zVdzn0/ta/CrAZLsvxrS7AgfVmheYiJn+R:wUeOMmn/zVSMqAZYBSzVmhU9+R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4744 Setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN\Setup.exe = "0" Setup.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SECURITYBAND Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SECURITYBAND\Setup.exe = "0" Setup.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS\Setup.exe = "1" Setup.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN Setup.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3552 wrote to memory of 4744 3552 3dad32112b1187fdf27cf41caf6098cb.exe 96 PID 3552 wrote to memory of 4744 3552 3dad32112b1187fdf27cf41caf6098cb.exe 96 PID 3552 wrote to memory of 4744 3552 3dad32112b1187fdf27cf41caf6098cb.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\3dad32112b1187fdf27cf41caf6098cb.exe"C:\Users\Admin\AppData\Local\Temp\3dad32112b1187fdf27cf41caf6098cb.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3552 -
C:\Users\Admin\AppData\Local\Temp\a2bHP1k7Ol\gSKQfql0\Setup.exeC:\Users\Admin\AppData\Local\Temp\a2bHP1k7Ol\gSKQfql0\Setup.exe --relaunch2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
PID:4744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD53dad32112b1187fdf27cf41caf6098cb
SHA1dd893498cd93cfe96dfcd99ce7bfd3b1ff90e313
SHA25624cca7c825646ffc033635f13edd9ec2fb1ebbc4f980241855e904efd55c8a5f
SHA512f89c055bda171e1a7390308f87daac1bafb4180204a1f320ff7752afbe7689eb76aea09b1dd9c4b5e4102cc9a1166e2a93c6563ed2289f6aa12fe9e1024837c3