Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
12/01/2024, 04:38
Static task
static1
Behavioral task
behavioral1
Sample
5582cf496275d80528eaa5c3f4783309.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5582cf496275d80528eaa5c3f4783309.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/SelfDelete.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/SelfDelete.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral5
Sample
launchers.exe
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
launchers.exe
Resource
win10v2004-20231215-en
General
-
Target
5582cf496275d80528eaa5c3f4783309.exe
-
Size
55KB
-
MD5
5582cf496275d80528eaa5c3f4783309
-
SHA1
16b795c15c789505d94f53960293e964ad58d2c0
-
SHA256
292f859b49b9578e855e75ad12ec42c643687f2f233344a83a55263aacc4cf64
-
SHA512
7a90c2a3061e28f31d67ae8f196699fd93ba694d51e60b75fcd2c37582da8e7023e6274541a37f27a7d94f6c4b5a4424ee4cf28b07acc1cd219617d4c200dc70
-
SSDEEP
1536:cpgpHzb9dZVX9fHMvG0D3XJE4Romu/Fyd+7qdqa:qgXdZt9P6D3XJE45v+mdqa
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1576 launchers.exe -
Loads dropped DLL 1 IoCs
pid Process 2856 5582cf496275d80528eaa5c3f4783309.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\·±Ã³ÄÁÆ®·Ñ = "C:\\Users\\Admin\\AppData\\Roaming\\launchers.exe" 5582cf496275d80528eaa5c3f4783309.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\·±Ã³ÄÁÆ®·Ñ = "C:\\Users\\Admin\\AppData\\Roaming\\launchers.exe" 5582cf496275d80528eaa5c3f4783309.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 4104 svchost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1576 launchers.exe 1576 launchers.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2856 wrote to memory of 1576 2856 5582cf496275d80528eaa5c3f4783309.exe 23 PID 2856 wrote to memory of 1576 2856 5582cf496275d80528eaa5c3f4783309.exe 23 PID 2856 wrote to memory of 1576 2856 5582cf496275d80528eaa5c3f4783309.exe 23 PID 2856 wrote to memory of 1384 2856 5582cf496275d80528eaa5c3f4783309.exe 19 PID 2856 wrote to memory of 1384 2856 5582cf496275d80528eaa5c3f4783309.exe 19 PID 2856 wrote to memory of 1384 2856 5582cf496275d80528eaa5c3f4783309.exe 19
Processes
-
C:\Users\Admin\AppData\Local\Temp\5582cf496275d80528eaa5c3f4783309.exe"C:\Users\Admin\AppData\Local\Temp\5582cf496275d80528eaa5c3f4783309.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c \DelUS.bat2⤵PID:1384
-
-
C:\Users\Admin\AppData\Roaming\launchers.exeC:\Users\Admin\AppData\Roaming\launchers.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1576
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:4496
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4104
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
200B
MD5324fbd9b9bd508a00122c3d096574704
SHA1ecb35204de1ac83e14df5681cad663258050ba8e
SHA2562dfc4f02ab1469ef0a8394f3a8d6b2ec4479faec95750d62f7f8e913ace287f8
SHA5121813db117f705ad9353fb2b4d20632c80c1332445ec601ce540332a0246f4fa158f0aad03dd3eaed5644aca6ee09c10c75ea3270eec88b5efc0c42e69f8f77bc
-
Filesize
24KB
MD57bf1bd7661385621c7908e36958f582e
SHA143242d7731c097e95fb96753c8262609ff929410
SHA256c0ad2c13d48c9fe62f898da822a5f08be3bf6c4e2c1c7ffdf7634f2ca4a8859e
SHA5128317af5cc3ac802eb095f3fa8cc71daa1265ca58fead031c07872f3d4bb07663a7002ae734fad392a7617f0923fe0caf1f54ed55afdf8516a6a08e202d86fa7f
-
Filesize
24KB
MD59c77a47c78d3003a0d6135aedcbed3ac
SHA126b14138e727f4c953dbe42ed2bc08e2c7e704e7
SHA2568052e39a6ec6f0f01d96b80bbbd22e8b3b6275a194de59675727f132ad63c463
SHA51297fd3ee49403cf4219b0caef73803e9722cc247ad209f72a85b6d2bdbaa08549c140ae82ad53ec133fb9dafeb943736084295ab1f7e6813d7ca3a56a7d9b04a8