Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    0s
  • max time network
    107s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/01/2024, 03:32

General

  • Target

    42a5f085cb986c0b7687afc3b050e168.exe

  • Size

    123KB

  • MD5

    42a5f085cb986c0b7687afc3b050e168

  • SHA1

    7538dcb9489b66b34ac5fe9d537c4bf0b1550700

  • SHA256

    7e85c66482d4209bbf5706d1e1954549cc45ed4133b992abbcf36c27c1a5b9af

  • SHA512

    4e39bb2e7af019788e5ce78d6d9f92ef6e550ad5312ce8a480f0635430e2affed3af886c6b15b6249f687445622dcad9b95d248d3980d9b5b4d3cb5cd5704ef5

  • SSDEEP

    3072:OeSQ41MZrrOwzrq5Ss9eYfphfFQkUcot3EpeBWLLM8M:OVYrJrOSsRwcpY

Score
7/10
upx

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs regedit.exe 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\42a5f085cb986c0b7687afc3b050e168.exe
    "C:\Users\Admin\AppData\Local\Temp\42a5f085cb986c0b7687afc3b050e168.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3108
    • C:\Windows\iaccess32.exe
      C:\Windows\iaccess32.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of SetWindowsHookEx
      PID:4844
  • C:\Windows\SysWOW64\regsvr32.exe
    regsvr32.exe /s "C:\Windows\system32\egaccess4_1071.dll"
    1⤵
      PID:4328
    • C:\Windows\System32\svchost.exe
      C:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv
      1⤵
        PID:4320
      • C:\Windows\SysWOW64\regedit.exe
        "C:\Windows\System32\regedit.exe" /s C:\Windows\tmlpcert2007
        1⤵
        • Runs regedit.exe
        PID:2336

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Windows\iaccess32.exe

        Filesize

        5KB

        MD5

        328a134891cb715c3f635f998ad97a34

        SHA1

        3e4c023eda1d338543a5c59d2ec9cd87cd3d1062

        SHA256

        f3d7b1229114fb5b44e0484ba0e54d1338363ba5d49572d11a76e9776c5d91a8

        SHA512

        860f005e8924cfa4b39f13cf7c2bdf1d21809af3cc3671cd3d9b5db6ccc63c2777b1ce2a6c43a9e165abcbeaf58115f53e95b554d871d8ae1225a1cd75f2d21a

      • C:\Windows\tmlpcert2007

        Filesize

        6KB

        MD5

        79f4311861a6578d6f35129095ef14e6

        SHA1

        9897343388cc3c7af1d508c4511205755c5d3e93

        SHA256

        96021d41f9db42dc88789286e43f14bf948bdf9c7ea2b6c4528ea9262691cb39

        SHA512

        9bf6257160c99a2152c54b27635f9bbd7e9e7d29eed707f2c8a4849447de0f9d2aafc9518e77788a4b5a410d7953fa7e92d8fc038792b570fe966aee82024348

      • memory/3108-0-0x0000000000400000-0x000000000042E000-memory.dmp

        Filesize

        184KB

      • memory/3108-5-0x0000000000400000-0x000000000042E000-memory.dmp

        Filesize

        184KB

      • memory/4328-28-0x0000000010000000-0x0000000010047000-memory.dmp

        Filesize

        284KB

      • memory/4328-60-0x0000000010000000-0x0000000010047000-memory.dmp

        Filesize

        284KB

      • memory/4844-6-0x0000000000400000-0x000000000042E000-memory.dmp

        Filesize

        184KB

      • memory/4844-58-0x0000000000400000-0x000000000042E000-memory.dmp

        Filesize

        184KB