Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
01/01/2024, 20:21
Static task
static1
Behavioral task
behavioral1
Sample
3dcb1fd38aa6652f0d1e89be4cb1fc8c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3dcb1fd38aa6652f0d1e89be4cb1fc8c.exe
Resource
win10v2004-20231215-en
General
-
Target
3dcb1fd38aa6652f0d1e89be4cb1fc8c.exe
-
Size
374KB
-
MD5
3dcb1fd38aa6652f0d1e89be4cb1fc8c
-
SHA1
ac968738b2b2ffd5547e24bab19da5406876825f
-
SHA256
2120c3a76f104d7962085d38480bf27d2664d30d1b560b9fc6bcd7b3f46c9aec
-
SHA512
893057b3a3505bf75ed3735d37933d35812af44190a3dd0064c62d9d091c0a1f4d4bf336086577161658631a1b23982080857487abef2c09f9cd9c3f2ed86d9b
-
SSDEEP
6144:XLPA/STp6gTF2idZecnl20lHRxp3gslk9ihl0/srEQpPK+e1FtEuxF+U2/kW:X99lRF3Z4mxx/oEtlK+kt9T2MW
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2792 PPKart.exe -
Loads dropped DLL 2 IoCs
pid Process 2792 PPKart.exe 2792 PPKart.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3dcb1fd38aa6652f0d1e89be4cb1fc8c.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\atmPP2.dll PPKart.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2792 PPKart.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3392 wrote to memory of 2792 3392 3dcb1fd38aa6652f0d1e89be4cb1fc8c.exe 18 PID 3392 wrote to memory of 2792 3392 3dcb1fd38aa6652f0d1e89be4cb1fc8c.exe 18 PID 3392 wrote to memory of 2792 3392 3dcb1fd38aa6652f0d1e89be4cb1fc8c.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\3dcb1fd38aa6652f0d1e89be4cb1fc8c.exe"C:\Users\Admin\AppData\Local\Temp\3dcb1fd38aa6652f0d1e89be4cb1fc8c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3392 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\PPKart.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\PPKart.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:2792
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5b765ba15515ada7d259bc8b604a3f6bd
SHA192ede9f1372596d770da5b4bd616cf9cfe0f0d73
SHA2567752ef4948e52cd9fed91291f1fa36a6407b3660f2a358930b18ff86f756c844
SHA512bd6cb298e52b40ffab512531bd4e9e25c7ca11308027b5b66bcdda3a0bf90ea9fa7d517dadfc7f1219d2c00228943f68c4a1ab614e96788239194dd80981376e
-
Filesize
25KB
MD5c8a0627642b5f836cacb13c29784a9fd
SHA1d9dda3645c34977a988d8158239b18f46547bc8a
SHA25655fe2435cc454a00f2d029b1a1be0694b1933ebeb1f4d6f84747a98a1a352cdc
SHA512e033bc7d9477d2bb11434f6d1c060ae6f6d8adc5971834e41c645840bbc15a793939b7c646386b3806cea17e93f97a18ac7182e24ac27b478b94febeed954b00