Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04/01/2024, 20:14
Static task
static1
Behavioral task
behavioral1
Sample
1fa5f289c2dd624b4da157b67c4b3954.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1fa5f289c2dd624b4da157b67c4b3954.exe
Resource
win10v2004-20231215-en
General
-
Target
1fa5f289c2dd624b4da157b67c4b3954.exe
-
Size
15KB
-
MD5
1fa5f289c2dd624b4da157b67c4b3954
-
SHA1
1fe176203eced9cfd6a1f6b920b7ab54c8b804de
-
SHA256
c0d3d9536f434075022bb09d0523b74aee433dec55d96103d93c1ba4498d2fed
-
SHA512
900f0d8827957dc93f86875537ec5da8ef037a8df81e969f1bec6dc82aeee48027758e78fe74b1582c67b44fcc2886bd211bdd140ccf58a1843d68d515cc8322
-
SSDEEP
384:WqPKe+qWpQsSV/PpHgbcWP7BswEb9vJEyT:WTUYQ/P0VPhe9F
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\gezmakrz.dll = "{AF976DCD-754F-4ac2-BE49-951DC7AA57D2}" 1fa5f289c2dd624b4da157b67c4b3954.exe -
Loads dropped DLL 1 IoCs
pid Process 2300 1fa5f289c2dd624b4da157b67c4b3954.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\gezmakrz.tmp 1fa5f289c2dd624b4da157b67c4b3954.exe File opened for modification C:\Windows\SysWOW64\gezmakrz.tmp 1fa5f289c2dd624b4da157b67c4b3954.exe File opened for modification C:\Windows\SysWOW64\gezmakrz.nls 1fa5f289c2dd624b4da157b67c4b3954.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AF976DCD-754F-4ac2-BE49-951DC7AA57D2} 1fa5f289c2dd624b4da157b67c4b3954.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AF976DCD-754F-4ac2-BE49-951DC7AA57D2}\InProcServer32 1fa5f289c2dd624b4da157b67c4b3954.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AF976DCD-754F-4ac2-BE49-951DC7AA57D2}\InProcServer32\ = "C:\\Windows\\SysWow64\\gezmakrz.dll" 1fa5f289c2dd624b4da157b67c4b3954.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AF976DCD-754F-4ac2-BE49-951DC7AA57D2}\InProcServer32\ThreadingModel = "Apartment" 1fa5f289c2dd624b4da157b67c4b3954.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2300 1fa5f289c2dd624b4da157b67c4b3954.exe 2300 1fa5f289c2dd624b4da157b67c4b3954.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2300 1fa5f289c2dd624b4da157b67c4b3954.exe 2300 1fa5f289c2dd624b4da157b67c4b3954.exe 2300 1fa5f289c2dd624b4da157b67c4b3954.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2300 wrote to memory of 4848 2300 1fa5f289c2dd624b4da157b67c4b3954.exe 98 PID 2300 wrote to memory of 4848 2300 1fa5f289c2dd624b4da157b67c4b3954.exe 98 PID 2300 wrote to memory of 4848 2300 1fa5f289c2dd624b4da157b67c4b3954.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\1fa5f289c2dd624b4da157b67c4b3954.exe"C:\Users\Admin\AppData\Local\Temp\1fa5f289c2dd624b4da157b67c4b3954.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\5416.tmp.bat2⤵PID:4848
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
179B
MD5393bdbd91735c4f179c5d4b621e21dcd
SHA165ef56551ac6b757d65fb29a2eb66eaa07723f79
SHA256e63b9004f84eb91798db51d4a746cc670575a55adee20e5ab9e55a85cb295534
SHA512ebfdc7e180b6f98a11bb8123fb3279670fc7f263e6f69f574d517c49a4e1ea76bacb0db0279de64dc345ea4f5c418bd85dbd8712838166d7dc8f8283f3c42c1c
-
Filesize
428B
MD5de74ac117042d88ba41481a8d8762d58
SHA10b9bc83b2f4b4867dcda00ade4dd7b42ce8d884c
SHA2563d7f2907e48ae8242207935f444d7d75cd0b15f2291112d35bb103612647872d
SHA512973345e037cf46b5364ccd955927d07ec8666d5923ea6740406527a0170c72b5814598f81bab4d5434dfb36a3acf131ebeec65206b0b7c9bc320f285acc2a612
-
Filesize
2.0MB
MD54dee46086ff68ab570cf1cc336035a7b
SHA11750c959dd8a648939585beeb90d838ac3ce5b8d
SHA2568277e0ac3b63b31fa27e6e6a4cccda219a40a9cc038b6c0384193c091d846510
SHA51269f8ba2d1e991c431c2495fe780afd9bcbf467c2f125de24d2de53139ea01f6c6526037f6c0af832275235067ea83bf8478652796cf56d55fce2fe479b68deda