Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
09/01/2024, 13:29
Static task
static1
Behavioral task
behavioral1
Sample
4e6d762a128f03ce870e3a62f88405b7.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4e6d762a128f03ce870e3a62f88405b7.exe
Resource
win10v2004-20231215-en
General
-
Target
4e6d762a128f03ce870e3a62f88405b7.exe
-
Size
1.9MB
-
MD5
4e6d762a128f03ce870e3a62f88405b7
-
SHA1
4bdd42e9376cc022121db91f1613c2571db24a53
-
SHA256
16b5827dcbb26970f37f15af460806c0948eab6617b7c2f351b9f053f79d000e
-
SHA512
a883884275ae3e997cb15c25e90864486b0f5c74837ebed64ef5aeab8273b8e94ec389b4751352cc23b2861f671446b04b3688d5f5254905fd4113642f24b2c4
-
SSDEEP
49152:wZp7Hvfp3dEfhhSOuDfg/0XBsCHfQKEdNwUI7mD6kxG:wZFPNdEfSOur60XBRfQFACDe
Malware Config
Signatures
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 1896 netsh.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\iexplorer = "C:\\Users\\Admin\\AppData\\Local\\Temp\\4e6d762a128f03ce870e3a62f88405b7.exe" 4e6d762a128f03ce870e3a62f88405b7.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\MEGATRON.ini 4e6d762a128f03ce870e3a62f88405b7.exe File created C:\Windows\SysWOW64\MEGATRON.ini 4e6d762a128f03ce870e3a62f88405b7.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\Prefetch\winlogo.exe 4e6d762a128f03ce870e3a62f88405b7.exe File opened for modification C:\Windows\ponto.DLL 4e6d762a128f03ce870e3a62f88405b7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Software\Microsoft\Internet Explorer\TypedURLs 4e6d762a128f03ce870e3a62f88405b7.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4464 4e6d762a128f03ce870e3a62f88405b7.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4464 4e6d762a128f03ce870e3a62f88405b7.exe 4464 4e6d762a128f03ce870e3a62f88405b7.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4464 wrote to memory of 1896 4464 4e6d762a128f03ce870e3a62f88405b7.exe 19 PID 4464 wrote to memory of 1896 4464 4e6d762a128f03ce870e3a62f88405b7.exe 19 PID 4464 wrote to memory of 1896 4464 4e6d762a128f03ce870e3a62f88405b7.exe 19
Processes
-
C:\Users\Admin\AppData\Local\Temp\4e6d762a128f03ce870e3a62f88405b7.exe"C:\Users\Admin\AppData\Local\Temp\4e6d762a128f03ce870e3a62f88405b7.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram C:\Users\Admin\AppData\Local\Temp\4e6d762a128f03ce870e3a62f88405b7.exeSz‰†2⤵
- Modifies Windows Firewall
PID:1896
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1