Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
13/01/2024, 14:47
Behavioral task
behavioral1
Sample
58fb6908563d7ca58bc4f11d5af0c2da.exe
Resource
win7-20231129-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
58fb6908563d7ca58bc4f11d5af0c2da.exe
Resource
win10v2004-20231222-en
6 signatures
150 seconds
General
-
Target
58fb6908563d7ca58bc4f11d5af0c2da.exe
-
Size
27KB
-
MD5
58fb6908563d7ca58bc4f11d5af0c2da
-
SHA1
32a0217989b22f099f2748d9a94cce44dc19ec44
-
SHA256
1967d22da4cf35379ff71d503094114b713071de67672606c03f239693e0eaae
-
SHA512
ac2c83dcc02fbb8031f44bc84099f38acc4f73608036b4f828fef203a7df183aa2b2ed49e1a25d5696f81027244f103644bbed22e6b98f402b2051071706db5f
-
SSDEEP
768:ypuTVQoynPg9f4cwafHpb7GYYMSqDC0LEhPFgFwSZHG:ywTV4Pg9fLwGkYYMSqDteMV
Score
8/10
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
resource yara_rule behavioral2/memory/1932-4-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1932-0-0x0000000000400000-0x000000000041E000-memory.dmp upx -
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects 58fb6908563d7ca58bc4f11d5af0c2da.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects 58fb6908563d7ca58bc4f11d5af0c2da.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\mmmavcav.dll 58fb6908563d7ca58bc4f11d5af0c2da.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Toolbar 58fb6908563d7ca58bc4f11d5af0c2da.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1932 wrote to memory of 4824 1932 58fb6908563d7ca58bc4f11d5af0c2da.exe 15 PID 1932 wrote to memory of 4824 1932 58fb6908563d7ca58bc4f11d5af0c2da.exe 15 PID 1932 wrote to memory of 4824 1932 58fb6908563d7ca58bc4f11d5af0c2da.exe 15
Processes
-
C:\Users\Admin\AppData\Local\Temp\58fb6908563d7ca58bc4f11d5af0c2da.exe"C:\Users\Admin\AppData\Local\Temp\58fb6908563d7ca58bc4f11d5af0c2da.exe"1⤵
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c preved.bat2⤵PID:4824
-