Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
08/01/2024, 14:50
Behavioral task
behavioral1
Sample
4bb97f5ee1796e08cb8629b6c80ae993.exe
Resource
win7-20231215-en
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
4bb97f5ee1796e08cb8629b6c80ae993.exe
Resource
win10v2004-20231222-en
6 signatures
150 seconds
General
-
Target
4bb97f5ee1796e08cb8629b6c80ae993.exe
-
Size
10KB
-
MD5
4bb97f5ee1796e08cb8629b6c80ae993
-
SHA1
1e91821c5ad818e478e72ff0941f5ebed14be0f8
-
SHA256
f5b476806e14d4194b343ff21df31ac1bb9b0aa07179911412dfee95123da72f
-
SHA512
b10d93162bf94a695120243246b6a5b1331bdd1913e1e461179a567dcf8b2efe5ff9066b41d575a89caab3820ed2b4c66088fb7876c62a8102ac741d51978973
-
SSDEEP
192:Ry6qv+F7pQtH5dWVJLD9popPzvKx1jRN6TDzi/6DGLdtYecLbf+OHTTFZ:ITg7pQtHDYLD0p2n+DO/I6YVbjzr
Score
8/10
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 5084 comboausk.exe -
resource yara_rule behavioral2/memory/2204-0-0x0000000000400000-0x000000000040E000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\comboaus.dll 4bb97f5ee1796e08cb8629b6c80ae993.exe File created C:\Windows\SysWOW64\comboausk.exe 4bb97f5ee1796e08cb8629b6c80ae993.exe File opened for modification C:\Windows\SysWOW64\comboausk.exe 4bb97f5ee1796e08cb8629b6c80ae993.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2204 4bb97f5ee1796e08cb8629b6c80ae993.exe 2204 4bb97f5ee1796e08cb8629b6c80ae993.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2204 wrote to memory of 5084 2204 4bb97f5ee1796e08cb8629b6c80ae993.exe 96 PID 2204 wrote to memory of 5084 2204 4bb97f5ee1796e08cb8629b6c80ae993.exe 96 PID 2204 wrote to memory of 5084 2204 4bb97f5ee1796e08cb8629b6c80ae993.exe 96 PID 2204 wrote to memory of 1720 2204 4bb97f5ee1796e08cb8629b6c80ae993.exe 99 PID 2204 wrote to memory of 1720 2204 4bb97f5ee1796e08cb8629b6c80ae993.exe 99 PID 2204 wrote to memory of 1720 2204 4bb97f5ee1796e08cb8629b6c80ae993.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\4bb97f5ee1796e08cb8629b6c80ae993.exe"C:\Users\Admin\AppData\Local\Temp\4bb97f5ee1796e08cb8629b6c80ae993.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\comboausk.exeC:\Windows\system32\comboausk.exe ˜‰2⤵
- Executes dropped EXE
PID:5084
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\4bb97f5ee1796e08cb8629b6c80ae993.exe.bat2⤵PID:1720
-