Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
0s -
max time network
107s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
05/01/2024, 03:32
Behavioral task
behavioral1
Sample
42a5f085cb986c0b7687afc3b050e168.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
42a5f085cb986c0b7687afc3b050e168.exe
Resource
win10v2004-20231215-en
General
-
Target
42a5f085cb986c0b7687afc3b050e168.exe
-
Size
123KB
-
MD5
42a5f085cb986c0b7687afc3b050e168
-
SHA1
7538dcb9489b66b34ac5fe9d537c4bf0b1550700
-
SHA256
7e85c66482d4209bbf5706d1e1954549cc45ed4133b992abbcf36c27c1a5b9af
-
SHA512
4e39bb2e7af019788e5ce78d6d9f92ef6e550ad5312ce8a480f0635430e2affed3af886c6b15b6249f687445622dcad9b95d248d3980d9b5b4d3cb5cd5704ef5
-
SSDEEP
3072:OeSQ41MZrrOwzrq5Ss9eYfphfFQkUcot3EpeBWLLM8M:OVYrJrOSsRwcpY
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4844 iaccess32.exe -
resource yara_rule behavioral2/memory/3108-0-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/files/0x000200000001fafe-4.dat upx behavioral2/memory/4844-6-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/3108-5-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/files/0x000200000001fafe-3.dat upx behavioral2/memory/4844-58-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\iaccess32.exe 42a5f085cb986c0b7687afc3b050e168.exe File created C:\Windows\tmlpcert2007 iaccess32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs regedit.exe 1 IoCs
pid Process 2336 regedit.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 3108 42a5f085cb986c0b7687afc3b050e168.exe 4844 iaccess32.exe 4844 iaccess32.exe 4844 iaccess32.exe 4844 iaccess32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3108 wrote to memory of 4844 3108 42a5f085cb986c0b7687afc3b050e168.exe 22 PID 3108 wrote to memory of 4844 3108 42a5f085cb986c0b7687afc3b050e168.exe 22 PID 3108 wrote to memory of 4844 3108 42a5f085cb986c0b7687afc3b050e168.exe 22
Processes
-
C:\Users\Admin\AppData\Local\Temp\42a5f085cb986c0b7687afc3b050e168.exe"C:\Users\Admin\AppData\Local\Temp\42a5f085cb986c0b7687afc3b050e168.exe"1⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Windows\iaccess32.exeC:\Windows\iaccess32.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:4844
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\Windows\system32\egaccess4_1071.dll"1⤵PID:4328
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv1⤵PID:4320
-
C:\Windows\SysWOW64\regedit.exe"C:\Windows\System32\regedit.exe" /s C:\Windows\tmlpcert20071⤵
- Runs regedit.exe
PID:2336
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5328a134891cb715c3f635f998ad97a34
SHA13e4c023eda1d338543a5c59d2ec9cd87cd3d1062
SHA256f3d7b1229114fb5b44e0484ba0e54d1338363ba5d49572d11a76e9776c5d91a8
SHA512860f005e8924cfa4b39f13cf7c2bdf1d21809af3cc3671cd3d9b5db6ccc63c2777b1ce2a6c43a9e165abcbeaf58115f53e95b554d871d8ae1225a1cd75f2d21a
-
Filesize
6KB
MD579f4311861a6578d6f35129095ef14e6
SHA19897343388cc3c7af1d508c4511205755c5d3e93
SHA25696021d41f9db42dc88789286e43f14bf948bdf9c7ea2b6c4528ea9262691cb39
SHA5129bf6257160c99a2152c54b27635f9bbd7e9e7d29eed707f2c8a4849447de0f9d2aafc9518e77788a4b5a410d7953fa7e92d8fc038792b570fe966aee82024348