Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
10/01/2024, 19:20
Behavioral task
behavioral1
Sample
36f0e4ed75a4cbbe79b1a7105bbb3995.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
36f0e4ed75a4cbbe79b1a7105bbb3995.exe
Resource
win10v2004-20231215-en
General
-
Target
36f0e4ed75a4cbbe79b1a7105bbb3995.exe
-
Size
13KB
-
MD5
36f0e4ed75a4cbbe79b1a7105bbb3995
-
SHA1
f9c8792aa1d0544a41effe50d0c33378bd977a5c
-
SHA256
1d0799de8e01ed4b223ed6e00d6e51cf8fcfc3142b9b794a901fb9baa3b4ecda
-
SHA512
c19fd65c087d2946f4045535dc21ed52e9e8fc15b049479d1af00207558c010e9d5921e5765bb3136d9d1e982cecc4cfadb0db4b10705be4d8e8586a54dcb47d
-
SSDEEP
192:m51V1upEMYREAW6tHwK1igssEcX4jXv+quAOhWEUmJA0B/CPd1jjkEp0hq:U/EA11MpXvagqkbjjkk0Q
Malware Config
Signatures
-
Modifies Shared Task Scheduler registry keys 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler 36f0e4ed75a4cbbe79b1a7105bbb3995.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler\{786C369D-409A-456f-A13C-971EADA850C6} = "DertertDE" 36f0e4ed75a4cbbe79b1a7105bbb3995.exe -
Loads dropped DLL 1 IoCs
pid Process 3888 rundll32.exe -
Registers COM server for autorun 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000_Classes\WOW6432Node\CLSID\{786C369D-409A-456f-A13C-971EADA850C6}\InProcServer32 36f0e4ed75a4cbbe79b1a7105bbb3995.exe Set value (str) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000_Classes\WOW6432Node\CLSID\{786C369D-409A-456f-A13C-971EADA850C6}\InProcServer32\ = "C:\\Windows\\SysWow64\\birdasfihuy32.dll" 36f0e4ed75a4cbbe79b1a7105bbb3995.exe Set value (str) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000_Classes\WOW6432Node\CLSID\{786C369D-409A-456f-A13C-971EADA850C6}\InProcServer32\ThreadingModel = "Apartment" 36f0e4ed75a4cbbe79b1a7105bbb3995.exe -
resource yara_rule behavioral2/memory/2232-0-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral2/memory/2232-5-0x0000000000400000-0x000000000040F000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\birdasfihuy32.dll 36f0e4ed75a4cbbe79b1a7105bbb3995.exe File created C:\Windows\SysWOW64\biasfardihuy.dll 36f0e4ed75a4cbbe79b1a7105bbb3995.exe -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000_Classes\WOW6432Node\CLSID 36f0e4ed75a4cbbe79b1a7105bbb3995.exe Key created \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000_Classes\WOW6432Node\CLSID\{786C369D-409A-456f-A13C-971EADA850C6} 36f0e4ed75a4cbbe79b1a7105bbb3995.exe Set value (str) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000_Classes\WOW6432Node\CLSID\{786C369D-409A-456f-A13C-971EADA850C6}\InProcServer32\ = "C:\\Windows\\SysWow64\\birdasfihuy32.dll" 36f0e4ed75a4cbbe79b1a7105bbb3995.exe Set value (str) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000_Classes\WOW6432Node\CLSID\{786C369D-409A-456f-A13C-971EADA850C6}\InProcServer32\ThreadingModel = "Apartment" 36f0e4ed75a4cbbe79b1a7105bbb3995.exe Key created \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000_Classes\WOW6432Node\CLSID\{786C369D-409A-456f-A13C-971EADA850C6}\InProcServer32 36f0e4ed75a4cbbe79b1a7105bbb3995.exe Key created \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000_Classes\WOW6432Node 36f0e4ed75a4cbbe79b1a7105bbb3995.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2232 wrote to memory of 3888 2232 36f0e4ed75a4cbbe79b1a7105bbb3995.exe 91 PID 2232 wrote to memory of 3888 2232 36f0e4ed75a4cbbe79b1a7105bbb3995.exe 91 PID 2232 wrote to memory of 3888 2232 36f0e4ed75a4cbbe79b1a7105bbb3995.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\36f0e4ed75a4cbbe79b1a7105bbb3995.exe"C:\Users\Admin\AppData\Local\Temp\36f0e4ed75a4cbbe79b1a7105bbb3995.exe"1⤵
- Modifies Shared Task Scheduler registry keys
- Registers COM server for autorun
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\system32\birdasfihuy32.dll, load2⤵
- Loads dropped DLL
PID:3888
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD54d837e1558925bc0f5e877f5622e3d72
SHA181e55afedf9e5cbdb7de3d0a706e4902cf6466c8
SHA25675ee404677b89dff50e0df72052158ef2d06245c8601af00c19cab70fa929b1c
SHA5127c55da66f18ec44cd2793ac72901ed11e437865d98f69402e66a75cbab4dfb419ba3f258b52ae374b9d10ff2083df16bb40437768491b52adaa30e33a32fcad4