Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
163s -
max time network
176s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
07/01/2024, 01:42
Behavioral task
behavioral1
Sample
47b33998ef4e57beb34ee2a8f1a6466d.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
47b33998ef4e57beb34ee2a8f1a6466d.exe
Resource
win10v2004-20231215-en
General
-
Target
47b33998ef4e57beb34ee2a8f1a6466d.exe
-
Size
53KB
-
MD5
47b33998ef4e57beb34ee2a8f1a6466d
-
SHA1
34cfe59fddf479b8b15a56e2a530141db434e59e
-
SHA256
c91af1f36a2009b0199b39c296396d0cd4cecad91d7d0e28dfd98de728ad0ea8
-
SHA512
23d085c01ee68b7cd87a60fea955839dffba051d2a5b6725ac7ca31c295883390a7cbe42bd70ed5dd8c3dc858a15b6b9ee1b53a8f9682e46d29cc805519b1f51
-
SSDEEP
1536:+NILhgs+xc5PtRDVjO2PT+3t0j4UOmk2jP+:+NIfPPxOdt/pmh+
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 3808 47b33998ef4e57beb34ee2a8f1a6466d.exe 3808 47b33998ef4e57beb34ee2a8f1a6466d.exe -
resource yara_rule behavioral2/memory/1484-0-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/1484-3-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/1484-4-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/3808-11-0x0000000000400000-0x0000000000420000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\Internet Explorer\Unix_Sg.Jmp 47b33998ef4e57beb34ee2a8f1a6466d.exe File created C:\Program Files\Internet Explorer\ftsKetNt.7ps 47b33998ef4e57beb34ee2a8f1a6466d.exe File created C:\Program Files\Internet Explorer\Unix_Sg.Jmp 47b33998ef4e57beb34ee2a8f1a6466d.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3808 47b33998ef4e57beb34ee2a8f1a6466d.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1484 wrote to memory of 3808 1484 47b33998ef4e57beb34ee2a8f1a6466d.exe 92 PID 1484 wrote to memory of 3808 1484 47b33998ef4e57beb34ee2a8f1a6466d.exe 92 PID 1484 wrote to memory of 3808 1484 47b33998ef4e57beb34ee2a8f1a6466d.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\47b33998ef4e57beb34ee2a8f1a6466d.exe"C:\Users\Admin\AppData\Local\Temp\47b33998ef4e57beb34ee2a8f1a6466d.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Users\Admin\AppData\Local\Temp\47b33998ef4e57beb34ee2a8f1a6466d.exe"C:\Users\Admin\AppData\Local\Temp\47b33998ef4e57beb34ee2a8f1a6466d.exe" x2⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:3808
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53KB
MD55cb2bc209bd2eb72269e965fd58a613f
SHA1365251e757cfbeadba1ae31f73ccfd03b958cb60
SHA256440ffc8498fe918ef3788d3933f434012b67d07ba4096c25ce0499ed93fc6f2f
SHA51235a7bfee70adc488e27ff9e810b74246742f5123e24b56a91328ba37c879db2f800f44ecd6e5a93f3021de89d8d1f37246a4afe4c674dec56b4ff58f478896a3
-
Filesize
69KB
MD58431a5e30a2e5a9e89f82978f1d4eaca
SHA1281b934ff5ec2d0cdcfe8b3790e224a159ef77a4
SHA256c89d846be384da9fa46ebf10602a6de9c9d74ee066247118c11ce5dd0fcd4a16
SHA512eba167985c4b72b19d40099d15e36def35319adae3c78818702525d6d20f0ab79832f3e4b0e22828f1e8fbd3a20f2e8f71c3aa1dda8009f85d68c4916b528018