Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
14/01/2024, 06:06
Static task
static1
Behavioral task
behavioral1
Sample
5a79d0380189c8296219eab03d16b21f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5a79d0380189c8296219eab03d16b21f.exe
Resource
win10v2004-20231222-en
General
-
Target
5a79d0380189c8296219eab03d16b21f.exe
-
Size
48KB
-
MD5
5a79d0380189c8296219eab03d16b21f
-
SHA1
6b9d3cd773aba8a68e9d0a8442994c6fa6a10ffd
-
SHA256
c476e398c5e77086a5b73fe67a95e4cd271d7e0f33da1bdba0fd0058e74ee82b
-
SHA512
8fb0cfa96315d6970471e4b1c88c488d7e9819288a99f190fa1d35366df1ae5da742836e8123f2f13c8493dc2a5c3b3b4718b6766e44136a8410c69222c3572e
-
SSDEEP
768:Uw/P9t01936rvuosdtvWgDcc3mkqbzID2Z+85DOWDOleX/dyIpAACe8A8w:z9Cn36rvuZzvWgDVqhMcTvdlpP8/
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run nedapaxk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\HyEzHyGyak = "C:\\ProgramData\\rqjuzuzg\\nedapaxk.exe" nedapaxk.exe -
Executes dropped EXE 1 IoCs
pid Process 3300 nedapaxk.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3272 5a79d0380189c8296219eab03d16b21f.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3272 wrote to memory of 3300 3272 5a79d0380189c8296219eab03d16b21f.exe 103 PID 3272 wrote to memory of 3300 3272 5a79d0380189c8296219eab03d16b21f.exe 103 PID 3272 wrote to memory of 3300 3272 5a79d0380189c8296219eab03d16b21f.exe 103 PID 3272 wrote to memory of 2284 3272 5a79d0380189c8296219eab03d16b21f.exe 104 PID 3272 wrote to memory of 2284 3272 5a79d0380189c8296219eab03d16b21f.exe 104 PID 3272 wrote to memory of 2284 3272 5a79d0380189c8296219eab03d16b21f.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a79d0380189c8296219eab03d16b21f.exe"C:\Users\Admin\AppData\Local\Temp\5a79d0380189c8296219eab03d16b21f.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3272 -
C:\ProgramData\rqjuzuzg\nedapaxk.exeC:\ProgramData\rqjuzuzg\nedapaxk.exe2⤵
- Adds policy Run key to start application
- Executes dropped EXE
PID:3300
-
-
C:\Windows\SysWOW64\cmd.exe/c del /f C:\Users\Admin\AppData\Local\Temp\5A79D0~1.EXE.bak >> NUL2⤵PID:2284
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48KB
MD55a79d0380189c8296219eab03d16b21f
SHA16b9d3cd773aba8a68e9d0a8442994c6fa6a10ffd
SHA256c476e398c5e77086a5b73fe67a95e4cd271d7e0f33da1bdba0fd0058e74ee82b
SHA5128fb0cfa96315d6970471e4b1c88c488d7e9819288a99f190fa1d35366df1ae5da742836e8123f2f13c8493dc2a5c3b3b4718b6766e44136a8410c69222c3572e