Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
09/01/2024, 01:03
Behavioral task
behavioral1
Sample
4ceef48a3324d053d2ff250bf452e3f7.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4ceef48a3324d053d2ff250bf452e3f7.exe
Resource
win10v2004-20231215-en
General
-
Target
4ceef48a3324d053d2ff250bf452e3f7.exe
-
Size
202KB
-
MD5
4ceef48a3324d053d2ff250bf452e3f7
-
SHA1
99cc25fa8e2f4875bbf29701954e3589719067af
-
SHA256
5c6fea4062b8fd5d64c76af688bcbec6d4acd7f1b683e62a96c052df1b976df2
-
SHA512
c1c6b5eb533f64cda4855b87ffa1ae4542c9df7e979e76ebaf09ef60b4481ec4678149ce44f56680d3a0dd27750ebe8df3b7e34800b809d195371abceb131144
-
SSDEEP
1536:bUHOp9Wl0fvKJE+lrGa78We+u8cdB5bEWeBG/UxhzG7JaP7zMX:OyKh4a0+OB5bEbG/Uxhzy47
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1924 idemoodp0cetka.exe 316 idemoodp0cetka.exe -
resource yara_rule behavioral2/memory/760-0-0x0000000000400000-0x0000000000439000-memory.dmp upx behavioral2/memory/760-6-0x0000000000400000-0x0000000000439000-memory.dmp upx behavioral2/files/0x000a000000023135-11.dat upx behavioral2/memory/1924-21-0x0000000000400000-0x0000000000439000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MS Service Manager = "C:\\Users\\Admin\\AppData\\Local\\Temp\\idemoodp0cetka.exe" 4ceef48a3324d053d2ff250bf452e3f7.exe Set value (str) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MS Service Manager = "C:\\Users\\Admin\\AppData\\Local\\Temp\\idemoodp0cetka.exe" 4ceef48a3324d053d2ff250bf452e3f7.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 760 set thread context of 2252 760 4ceef48a3324d053d2ff250bf452e3f7.exe 91 PID 1924 set thread context of 316 1924 idemoodp0cetka.exe 96 -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 760 4ceef48a3324d053d2ff250bf452e3f7.exe 1924 idemoodp0cetka.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 760 wrote to memory of 2252 760 4ceef48a3324d053d2ff250bf452e3f7.exe 91 PID 760 wrote to memory of 2252 760 4ceef48a3324d053d2ff250bf452e3f7.exe 91 PID 760 wrote to memory of 2252 760 4ceef48a3324d053d2ff250bf452e3f7.exe 91 PID 760 wrote to memory of 2252 760 4ceef48a3324d053d2ff250bf452e3f7.exe 91 PID 760 wrote to memory of 2252 760 4ceef48a3324d053d2ff250bf452e3f7.exe 91 PID 760 wrote to memory of 2252 760 4ceef48a3324d053d2ff250bf452e3f7.exe 91 PID 760 wrote to memory of 2252 760 4ceef48a3324d053d2ff250bf452e3f7.exe 91 PID 760 wrote to memory of 2252 760 4ceef48a3324d053d2ff250bf452e3f7.exe 91 PID 2252 wrote to memory of 1924 2252 4ceef48a3324d053d2ff250bf452e3f7.exe 94 PID 2252 wrote to memory of 1924 2252 4ceef48a3324d053d2ff250bf452e3f7.exe 94 PID 2252 wrote to memory of 1924 2252 4ceef48a3324d053d2ff250bf452e3f7.exe 94 PID 1924 wrote to memory of 316 1924 idemoodp0cetka.exe 96 PID 1924 wrote to memory of 316 1924 idemoodp0cetka.exe 96 PID 1924 wrote to memory of 316 1924 idemoodp0cetka.exe 96 PID 1924 wrote to memory of 316 1924 idemoodp0cetka.exe 96 PID 1924 wrote to memory of 316 1924 idemoodp0cetka.exe 96 PID 1924 wrote to memory of 316 1924 idemoodp0cetka.exe 96 PID 1924 wrote to memory of 316 1924 idemoodp0cetka.exe 96 PID 1924 wrote to memory of 316 1924 idemoodp0cetka.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ceef48a3324d053d2ff250bf452e3f7.exe"C:\Users\Admin\AppData\Local\Temp\4ceef48a3324d053d2ff250bf452e3f7.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Users\Admin\AppData\Local\Temp\4ceef48a3324d053d2ff250bf452e3f7.exe"C:\Users\Admin\AppData\Local\Temp\4ceef48a3324d053d2ff250bf452e3f7.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\idemoodp0cetka.exe"C:\Users\Admin\AppData\Local\Temp\idemoodp0cetka.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\idemoodp0cetka.exe"C:\Users\Admin\AppData\Local\Temp\idemoodp0cetka.exe"4⤵
- Executes dropped EXE
PID:316
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
202KB
MD54ceef48a3324d053d2ff250bf452e3f7
SHA199cc25fa8e2f4875bbf29701954e3589719067af
SHA2565c6fea4062b8fd5d64c76af688bcbec6d4acd7f1b683e62a96c052df1b976df2
SHA512c1c6b5eb533f64cda4855b87ffa1ae4542c9df7e979e76ebaf09ef60b4481ec4678149ce44f56680d3a0dd27750ebe8df3b7e34800b809d195371abceb131144