Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    188s
  • max time network
    199s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/01/2024, 10:09

General

  • Target

    45f5982659f8859a571e5e7428212d71.exe

  • Size

    134KB

  • MD5

    45f5982659f8859a571e5e7428212d71

  • SHA1

    44311718558d59126bf46ff11373fb3b65cfb338

  • SHA256

    e6fc16832bfea3a36cddafcb29380e31aad6a1e0c867952705b1ea33792312a5

  • SHA512

    7b8a8fde89298304b73ebeb37c32d2ab57b5354d781e09e39b855ff9f753b8b3b944ad258af3741b60b77af5d0a09c9df4e355a19659e0d1f017ba0c2f0d1e78

  • SSDEEP

    3072:z6Y86ICOgKZBEt3t04XaWxIBUFCneGFYYBuVTCFDQ:OY86kgKs3t0PWWBCUeukCFE

Score
7/10
upx

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 6 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\45f5982659f8859a571e5e7428212d71.exe
    "C:\Users\Admin\AppData\Local\Temp\45f5982659f8859a571e5e7428212d71.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1568
    • C:\Windows\Pgekea.exe
      C:\Windows\Pgekea.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      PID:4512

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Pgekea.exe

    Filesize

    134KB

    MD5

    45f5982659f8859a571e5e7428212d71

    SHA1

    44311718558d59126bf46ff11373fb3b65cfb338

    SHA256

    e6fc16832bfea3a36cddafcb29380e31aad6a1e0c867952705b1ea33792312a5

    SHA512

    7b8a8fde89298304b73ebeb37c32d2ab57b5354d781e09e39b855ff9f753b8b3b944ad258af3741b60b77af5d0a09c9df4e355a19659e0d1f017ba0c2f0d1e78

  • C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job

    Filesize

    362B

    MD5

    6bf2ddc76a6f3944a13ce90022f6e336

    SHA1

    28fa933b537775ab35ee314faf512602303c4a36

    SHA256

    4ea7310368dfafd4718790f5c94bf887170f29545e25d5bca289e5cd4bd0410c

    SHA512

    c1f6e73e63f2b64cdc681a07b906a8e2a4b392c0ba9fa3111cacc9281c3fc99d84f2ad95e4d06b93f53be34ae2d083e8c4f8a39fc2b5c4dbb4720186a9b65981

  • memory/1568-7-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/1568-18-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/1568-5-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/1568-0-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/1568-8-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/1568-11-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/1568-2-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/1568-20-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/1568-1-0x00000000008C0000-0x00000000008C1000-memory.dmp

    Filesize

    4KB

  • memory/1568-3-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/4512-19-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/4512-15-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/4512-2172-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/4512-17822-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/4512-29740-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/4512-39400-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/4512-52446-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/4512-67622-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/4512-79844-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/4512-92960-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB