Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
13/01/2024, 04:37
Behavioral task
behavioral1
Sample
580010826dc0a0ce231ceb6c97d62e00.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
580010826dc0a0ce231ceb6c97d62e00.exe
Resource
win10v2004-20231222-en
General
-
Target
580010826dc0a0ce231ceb6c97d62e00.exe
-
Size
173KB
-
MD5
580010826dc0a0ce231ceb6c97d62e00
-
SHA1
64ce875324d662f8da0f269ba7f6923f6a49e541
-
SHA256
a87831c3199d6c30af70df9871e01214c5a8f1d0e218fb9dc348b9da9aedc7f3
-
SHA512
1c0f75418766b0aa1ea3e511522e1de068cf88d10364432c0908e03cd2c6f063d7e70ba80c840888dbbadf7f52f7220b3d5732eaacd224a83c462f1a582ca72e
-
SSDEEP
3072:IUdv8Zim/qoRcLH5Qj8z578v/P/FGNgkf+El48UOmmiC2UGkEK+gHei1ktYct:Pd8Z3J45a/P/FGikWEl48U2EKVT1U5t
Malware Config
Signatures
-
resource yara_rule behavioral2/files/0x0007000000023200-5.dat aspack_v212_v242 -
Loads dropped DLL 1 IoCs
pid Process 4564 580010826dc0a0ce231ceb6c97d62e00.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\king_mg = "C:\\Windows\\system32\\mgking.exe" 580010826dc0a0ce231ceb6c97d62e00.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\mgking.exe 580010826dc0a0ce231ceb6c97d62e00.exe File opened for modification C:\Windows\SysWOW64\mgking0.dll 580010826dc0a0ce231ceb6c97d62e00.exe File created C:\Windows\SysWOW64\mgking0.dll 580010826dc0a0ce231ceb6c97d62e00.exe File opened for modification C:\Windows\SysWOW64\mgking.exe 580010826dc0a0ce231ceb6c97d62e00.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 1996 4564 WerFault.exe 75 1240 4564 WerFault.exe 75 -
Suspicious behavior: EnumeratesProcesses 34 IoCs
pid Process 4564 580010826dc0a0ce231ceb6c97d62e00.exe 4564 580010826dc0a0ce231ceb6c97d62e00.exe 4564 580010826dc0a0ce231ceb6c97d62e00.exe 4564 580010826dc0a0ce231ceb6c97d62e00.exe 4564 580010826dc0a0ce231ceb6c97d62e00.exe 4564 580010826dc0a0ce231ceb6c97d62e00.exe 4564 580010826dc0a0ce231ceb6c97d62e00.exe 4564 580010826dc0a0ce231ceb6c97d62e00.exe 4564 580010826dc0a0ce231ceb6c97d62e00.exe 4564 580010826dc0a0ce231ceb6c97d62e00.exe 4564 580010826dc0a0ce231ceb6c97d62e00.exe 4564 580010826dc0a0ce231ceb6c97d62e00.exe 4564 580010826dc0a0ce231ceb6c97d62e00.exe 4564 580010826dc0a0ce231ceb6c97d62e00.exe 4564 580010826dc0a0ce231ceb6c97d62e00.exe 4564 580010826dc0a0ce231ceb6c97d62e00.exe 4564 580010826dc0a0ce231ceb6c97d62e00.exe 4564 580010826dc0a0ce231ceb6c97d62e00.exe 4564 580010826dc0a0ce231ceb6c97d62e00.exe 4564 580010826dc0a0ce231ceb6c97d62e00.exe 4564 580010826dc0a0ce231ceb6c97d62e00.exe 4564 580010826dc0a0ce231ceb6c97d62e00.exe 4564 580010826dc0a0ce231ceb6c97d62e00.exe 4564 580010826dc0a0ce231ceb6c97d62e00.exe 4564 580010826dc0a0ce231ceb6c97d62e00.exe 4564 580010826dc0a0ce231ceb6c97d62e00.exe 4564 580010826dc0a0ce231ceb6c97d62e00.exe 4564 580010826dc0a0ce231ceb6c97d62e00.exe 4564 580010826dc0a0ce231ceb6c97d62e00.exe 4564 580010826dc0a0ce231ceb6c97d62e00.exe 4564 580010826dc0a0ce231ceb6c97d62e00.exe 4564 580010826dc0a0ce231ceb6c97d62e00.exe 4564 580010826dc0a0ce231ceb6c97d62e00.exe 4564 580010826dc0a0ce231ceb6c97d62e00.exe -
Suspicious use of WriteProcessMemory 1 IoCs
description pid Process procid_target PID 4564 wrote to memory of 3596 4564 580010826dc0a0ce231ceb6c97d62e00.exe 30
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3596
-
C:\Users\Admin\AppData\Local\Temp\580010826dc0a0ce231ceb6c97d62e00.exe"C:\Users\Admin\AppData\Local\Temp\580010826dc0a0ce231ceb6c97d62e00.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4564 -s 2283⤵
- Program crash
PID:1996
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4564 -s 4643⤵
- Program crash
PID:1240
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4564 -ip 45641⤵PID:1464
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4564 -ip 45641⤵PID:4144
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
113KB
MD5a919ffcce9fc97ef023b92092321e7cc
SHA11e28d9f3bd7d489b02235e0b9cf444d25cbdcf74
SHA25653ecb6f88cacb31841717f0793648ef6961126aab8fc1d4d6f381cab80f2a8c8
SHA5128765b21f4916a61caffb3565735a5921754455addac53d01ccd86d866f25bdd7e2837e1ad330d658519df9a635ec236e2ed39f5d9f73911a21869b159d04eb82