Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    17s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/01/2024, 17:00

General

  • Target

    83dafce0560e7493e6dae82c270131a5.exe

  • Size

    394KB

  • MD5

    83dafce0560e7493e6dae82c270131a5

  • SHA1

    5fdfe162b399a315508a55535c5b1f31012e4f39

  • SHA256

    80c26f68b8a46af63f3ee4b35c8150f1710d7aaa1cf8e39cb5c94ec29e9b7c11

  • SHA512

    cf2a9c2db3ee19a17979d2b3e92103566a691d59af8f376a56fcc1df1be12a06d47d40c6df0a7e54db4e2575486fd481e95560813721440105e06ba49196e18e

  • SSDEEP

    6144:9bpGtfoVtScw2RCgrzItQB2bpGtfoVtScw:TGtAtScw3qEKBYGtAtScw

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Modifies system executable filetype association 2 TTPs 2 IoCs
  • UPX packed file 14 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 34 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies registry class 17 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\83dafce0560e7493e6dae82c270131a5.exe
    "C:\Users\Admin\AppData\Local\Temp\83dafce0560e7493e6dae82c270131a5.exe"
    1⤵
    • Adds Run key to start application
    • Enumerates connected drives
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1876
    • C:\odt\VEM.EXE
      C:\odt\VEM.EXE
      2⤵
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Enumerates connected drives
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      PID:4828

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\odt\VEM.EXE

    Filesize

    33KB

    MD5

    82ae0487634fb0810d8fbcfcba44ad67

    SHA1

    635841e2ab018d1fc2aa0e17d22839d06e0df510

    SHA256

    9e4c4612963ea499bc430bc9bf69d1adb630eda2feffa256e7ca0f3bc103e0f7

    SHA512

    58f17a6b61f4d7798290968b684a6a1d7f08b2ab4c7374de3db305d24fd4a07a34b3b30e7e2c02965c575ee465f8c2b4b8cfd28516dde2d302b9022661d7db39

  • C:\odt\VEM.EXE

    Filesize

    1KB

    MD5

    ed1267deeb39291b72351b89af5e81e0

    SHA1

    45ff406c7bf0fe98cd2eccd65cd353d108986ee3

    SHA256

    557fda6dd58b2e85e96b00524c163fc1c6c745fe5d8764926481bfc759993b12

    SHA512

    3b1b4942a1988f36e3377865088885613b5cfa2c2633b7f08df961e0370468b17325d73544581f1daf5d32b94a1cd9d0c335cdee7e7d9826dae3391e94b7257c

  • memory/1876-0-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/1876-25-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/1876-1-0x0000000000A40000-0x0000000000A41000-memory.dmp

    Filesize

    4KB

  • memory/4828-31-0x0000000000600000-0x0000000000601000-memory.dmp

    Filesize

    4KB

  • memory/4828-36-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/4828-26-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/4828-30-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/4828-24-0x0000000000600000-0x0000000000601000-memory.dmp

    Filesize

    4KB

  • memory/4828-32-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/4828-33-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/4828-34-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/4828-35-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/4828-23-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/4828-37-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/4828-38-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/4828-39-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/4828-40-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/4828-41-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/4828-42-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/4828-43-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB