Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
101s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
08/01/2024, 13:07
Behavioral task
behavioral1
Sample
4b84da0c5644fe9c4a1f716968f94bc9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4b84da0c5644fe9c4a1f716968f94bc9.exe
Resource
win10v2004-20231222-en
General
-
Target
4b84da0c5644fe9c4a1f716968f94bc9.exe
-
Size
14KB
-
MD5
4b84da0c5644fe9c4a1f716968f94bc9
-
SHA1
f09dad14f88368b27d26238b8b91fab47e21bd3f
-
SHA256
d7b43b7764a6aad54f95959cb5df8c3af03d2e2e5dbd8995e3cf344414ca8b1b
-
SHA512
62d30393f9253b8e66b0c6c13ed91a3b65f08e0084c5360b7cdd6de693329da181a6695958cf321a311e6db01092123837c29e98387ee920b2a2434c98290870
-
SSDEEP
384:monK/sS4BMER9HEyCIQ/D9YiplKdShDxLKV:moK0S4FBEyCxPpHh9G
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 4912 ezcronk.exe -
resource yara_rule behavioral2/memory/2056-0-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/files/0x000700000002324d-4.dat upx behavioral2/memory/4912-6-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/2056-7-0x0000000000400000-0x0000000000412000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\ezcron.dll 4b84da0c5644fe9c4a1f716968f94bc9.exe File created C:\Windows\SysWOW64\ezcronk.exe 4b84da0c5644fe9c4a1f716968f94bc9.exe File opened for modification C:\Windows\SysWOW64\ezcronk.exe 4b84da0c5644fe9c4a1f716968f94bc9.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2056 wrote to memory of 4912 2056 4b84da0c5644fe9c4a1f716968f94bc9.exe 23 PID 2056 wrote to memory of 4912 2056 4b84da0c5644fe9c4a1f716968f94bc9.exe 23 PID 2056 wrote to memory of 4912 2056 4b84da0c5644fe9c4a1f716968f94bc9.exe 23 PID 2056 wrote to memory of 4080 2056 4b84da0c5644fe9c4a1f716968f94bc9.exe 106 PID 2056 wrote to memory of 4080 2056 4b84da0c5644fe9c4a1f716968f94bc9.exe 106 PID 2056 wrote to memory of 4080 2056 4b84da0c5644fe9c4a1f716968f94bc9.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b84da0c5644fe9c4a1f716968f94bc9.exe"C:\Users\Admin\AppData\Local\Temp\4b84da0c5644fe9c4a1f716968f94bc9.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\SysWOW64\ezcronk.exeC:\Windows\system32\ezcronk.exe ˜‰2⤵
- Executes dropped EXE
PID:4912
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\4b84da0c5644fe9c4a1f716968f94bc9.exe.bat2⤵PID:4080
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
182B
MD5b04d444dc130097a6fc84a07eeef9e5d
SHA17ae482f66001277c48c206026d593c5ee965904d
SHA2567afa7355bf8fc5438ec06d3ab84d6df7b4a3e32230f9f950428c337a38f612fc
SHA5126c334c38eee69533a1579c0d05c050ef37bce017fad1b6057c577ffa6346140982e39c25645609f5403483910adf142abeeaf1bd629a43cac7a3d143d2d8f665
-
Filesize
14KB
MD54b84da0c5644fe9c4a1f716968f94bc9
SHA1f09dad14f88368b27d26238b8b91fab47e21bd3f
SHA256d7b43b7764a6aad54f95959cb5df8c3af03d2e2e5dbd8995e3cf344414ca8b1b
SHA51262d30393f9253b8e66b0c6c13ed91a3b65f08e0084c5360b7cdd6de693329da181a6695958cf321a311e6db01092123837c29e98387ee920b2a2434c98290870