Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
11/01/2024, 20:48
Static task
static1
Behavioral task
behavioral1
Sample
548b99c7ec0059f88b2cfb3028ac71e1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
548b99c7ec0059f88b2cfb3028ac71e1.exe
Resource
win10v2004-20231222-en
General
-
Target
548b99c7ec0059f88b2cfb3028ac71e1.exe
-
Size
46KB
-
MD5
548b99c7ec0059f88b2cfb3028ac71e1
-
SHA1
78a869e6e4c2e9bf3a51d63917f470569d88753b
-
SHA256
72a29552834c59b6c49d08e3e75a31d517531edc9fdf2b50f96ebe6fbc6de14b
-
SHA512
11437c73d6ca52abe6a699f63b76ede2fc9361d14c0555cf8e5fb0e0dbb7a5ce06f20bc594808073f48ec0128707b903cfe8374ed2e2a823b85eeaa2e79fe42e
-
SSDEEP
768:Ps+M1PzSw++TvQJHsHkiKLMB/p68VszmHAqs9wqv/+P7GzkRt/qL/Co03TCkDLHx:0+aSNZJXibNjM9wI/M7Gzk72/CpDCuR
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\kusn33sd\ImagePath = "C:\\Windows\\system32\\kusn33sd.exe -j" 548b99c7ec0059f88b2cfb3028ac71e1.exe -
Executes dropped EXE 1 IoCs
pid Process 4220 kusn33sd.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\kusn33sd.exe 548b99c7ec0059f88b2cfb3028ac71e1.exe File created C:\Windows\SysWOW64\kusn33sd.exe kusn33sd.exe File created C:\Windows\SysWOW64\KillMe.bat 548b99c7ec0059f88b2cfb3028ac71e1.exe File created C:\Windows\SysWOW64\kusn433sd3.dll kusn33sd.exe File created C:\Windows\SysWOW64\kusn33sd.exe 548b99c7ec0059f88b2cfb3028ac71e1.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1196 548b99c7ec0059f88b2cfb3028ac71e1.exe 1196 548b99c7ec0059f88b2cfb3028ac71e1.exe 4220 kusn33sd.exe 4220 kusn33sd.exe 4220 kusn33sd.exe 4220 kusn33sd.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1196 wrote to memory of 2116 1196 548b99c7ec0059f88b2cfb3028ac71e1.exe 91 PID 1196 wrote to memory of 2116 1196 548b99c7ec0059f88b2cfb3028ac71e1.exe 91 PID 1196 wrote to memory of 2116 1196 548b99c7ec0059f88b2cfb3028ac71e1.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\548b99c7ec0059f88b2cfb3028ac71e1.exe"C:\Users\Admin\AppData\Local\Temp\548b99c7ec0059f88b2cfb3028ac71e1.exe"1⤵
- Sets service image path in registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\KillMe.bat2⤵PID:2116
-
-
C:\Windows\SysWOW64\kusn33sd.exeC:\Windows\SysWOW64\kusn33sd.exe -j1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:4220
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
211B
MD5a70d574e50ec7509658f838fdf3cbd2e
SHA1cf4d17cd835749c42fc112e00c3b19de113ab2b0
SHA256441990fab5b65344230738fbbd033eaeac6f5e835924600c987362911f8d01c7
SHA5126773ef498479926a24085cad5f1e1ab2aae2091c5ac165dae13afbbd13cb82e2a4d5f2c6fd5258843c3caf38e160eced1798ade0fbfc5f534058936c3dbd45d5
-
Filesize
46KB
MD5548b99c7ec0059f88b2cfb3028ac71e1
SHA178a869e6e4c2e9bf3a51d63917f470569d88753b
SHA25672a29552834c59b6c49d08e3e75a31d517531edc9fdf2b50f96ebe6fbc6de14b
SHA51211437c73d6ca52abe6a699f63b76ede2fc9361d14c0555cf8e5fb0e0dbb7a5ce06f20bc594808073f48ec0128707b903cfe8374ed2e2a823b85eeaa2e79fe42e