Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
162s -
max time network
175s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
09/01/2024, 16:13
Static task
static1
Behavioral task
behavioral1
Sample
4ec415fae7663a7b2a5ab238e8dd47ec.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4ec415fae7663a7b2a5ab238e8dd47ec.exe
Resource
win10v2004-20231215-en
General
-
Target
4ec415fae7663a7b2a5ab238e8dd47ec.exe
-
Size
449KB
-
MD5
4ec415fae7663a7b2a5ab238e8dd47ec
-
SHA1
984b185e8025edd571f4ee4a34353824d0c974f1
-
SHA256
e861c3656e94f99a9a642b6d1e3d0685bc5230859bfcaa1a4c55316f8708a11a
-
SHA512
7a38ba6617dcf7c37d0467a89143f72c0e9ef81e828cb1bfbb818ee401f83c8864a2d0d584c9e78418d243d1b5f63a9dbbadccc128d387f794d9af0c2f36811a
-
SSDEEP
6144:DSE6PwjBhRD2pggYV4Iys19B7vCNzB5O39YxfCtNL9kxBLj9C3bdu3sz6c7eDSaC:u4Dng3d09YHu9YszL9Iad6GCtC
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2652 lB33602EbIlL33602.exe -
Executes dropped EXE 1 IoCs
pid Process 2652 lB33602EbIlL33602.exe -
resource yara_rule behavioral2/memory/1812-1-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/memory/1812-14-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/memory/2652-24-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/memory/2652-29-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/memory/2652-32-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/memory/2652-35-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/memory/2652-40-0x0000000000400000-0x00000000004C2000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\lB33602EbIlL33602 = "C:\\ProgramData\\lB33602EbIlL33602\\lB33602EbIlL33602.exe" lB33602EbIlL33602.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1812 4ec415fae7663a7b2a5ab238e8dd47ec.exe 1812 4ec415fae7663a7b2a5ab238e8dd47ec.exe 1812 4ec415fae7663a7b2a5ab238e8dd47ec.exe 1812 4ec415fae7663a7b2a5ab238e8dd47ec.exe 1812 4ec415fae7663a7b2a5ab238e8dd47ec.exe 1812 4ec415fae7663a7b2a5ab238e8dd47ec.exe 1812 4ec415fae7663a7b2a5ab238e8dd47ec.exe 1812 4ec415fae7663a7b2a5ab238e8dd47ec.exe 1812 4ec415fae7663a7b2a5ab238e8dd47ec.exe 1812 4ec415fae7663a7b2a5ab238e8dd47ec.exe 1812 4ec415fae7663a7b2a5ab238e8dd47ec.exe 1812 4ec415fae7663a7b2a5ab238e8dd47ec.exe 2652 lB33602EbIlL33602.exe 2652 lB33602EbIlL33602.exe 2652 lB33602EbIlL33602.exe 2652 lB33602EbIlL33602.exe 2652 lB33602EbIlL33602.exe 2652 lB33602EbIlL33602.exe 2652 lB33602EbIlL33602.exe 2652 lB33602EbIlL33602.exe 2652 lB33602EbIlL33602.exe 2652 lB33602EbIlL33602.exe 2652 lB33602EbIlL33602.exe 2652 lB33602EbIlL33602.exe 2652 lB33602EbIlL33602.exe 2652 lB33602EbIlL33602.exe 2652 lB33602EbIlL33602.exe 2652 lB33602EbIlL33602.exe 2652 lB33602EbIlL33602.exe 2652 lB33602EbIlL33602.exe 2652 lB33602EbIlL33602.exe 2652 lB33602EbIlL33602.exe 2652 lB33602EbIlL33602.exe 2652 lB33602EbIlL33602.exe 2652 lB33602EbIlL33602.exe 2652 lB33602EbIlL33602.exe 2652 lB33602EbIlL33602.exe 2652 lB33602EbIlL33602.exe 2652 lB33602EbIlL33602.exe 2652 lB33602EbIlL33602.exe 2652 lB33602EbIlL33602.exe 2652 lB33602EbIlL33602.exe 2652 lB33602EbIlL33602.exe 2652 lB33602EbIlL33602.exe 2652 lB33602EbIlL33602.exe 2652 lB33602EbIlL33602.exe 2652 lB33602EbIlL33602.exe 2652 lB33602EbIlL33602.exe 2652 lB33602EbIlL33602.exe 2652 lB33602EbIlL33602.exe 2652 lB33602EbIlL33602.exe 2652 lB33602EbIlL33602.exe 2652 lB33602EbIlL33602.exe 2652 lB33602EbIlL33602.exe 2652 lB33602EbIlL33602.exe 2652 lB33602EbIlL33602.exe 2652 lB33602EbIlL33602.exe 2652 lB33602EbIlL33602.exe 2652 lB33602EbIlL33602.exe 2652 lB33602EbIlL33602.exe 2652 lB33602EbIlL33602.exe 2652 lB33602EbIlL33602.exe 2652 lB33602EbIlL33602.exe 2652 lB33602EbIlL33602.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1812 4ec415fae7663a7b2a5ab238e8dd47ec.exe Token: SeDebugPrivilege 2652 lB33602EbIlL33602.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2652 lB33602EbIlL33602.exe 2652 lB33602EbIlL33602.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2652 lB33602EbIlL33602.exe 2652 lB33602EbIlL33602.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2652 lB33602EbIlL33602.exe 2652 lB33602EbIlL33602.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1812 wrote to memory of 2652 1812 4ec415fae7663a7b2a5ab238e8dd47ec.exe 90 PID 1812 wrote to memory of 2652 1812 4ec415fae7663a7b2a5ab238e8dd47ec.exe 90 PID 1812 wrote to memory of 2652 1812 4ec415fae7663a7b2a5ab238e8dd47ec.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ec415fae7663a7b2a5ab238e8dd47ec.exe"C:\Users\Admin\AppData\Local\Temp\4ec415fae7663a7b2a5ab238e8dd47ec.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\ProgramData\lB33602EbIlL33602\lB33602EbIlL33602.exe"C:\ProgramData\lB33602EbIlL33602\lB33602EbIlL33602.exe" "C:\Users\Admin\AppData\Local\Temp\4ec415fae7663a7b2a5ab238e8dd47ec.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2652
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
449KB
MD5887bc457c58ccb1a7a7c1dc79ce88f90
SHA19d7d084aa42b26c90cc316ea991369fc811632c4
SHA25619a1e2d940c368a7a772989b5b1ce61f78d6a023597ce5d7e78d911642a0ad90
SHA51203a0ba8bae2c9f858496b6be4bf5b45666e2f63332fe2ac36e62875913f0496df053dd6f44e01f500bffc66194459f10aec52ac30de739adb37b99b96ba97786