Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
15/01/2024, 03:38
Static task
static1
Behavioral task
behavioral1
Sample
5c093f72d1ac9fa97d0d5289655e7d74.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5c093f72d1ac9fa97d0d5289655e7d74.exe
Resource
win10v2004-20231222-en
General
-
Target
5c093f72d1ac9fa97d0d5289655e7d74.exe
-
Size
46KB
-
MD5
5c093f72d1ac9fa97d0d5289655e7d74
-
SHA1
9b8fd11233416fe520cda2be289775850bbf3cd1
-
SHA256
8aa82fd500e80cc53263f05b916ea7a4a0eb3ed5b54ce3ed98e02fff45d739f5
-
SHA512
a7940f1505eef9e345f0f2d6a0eb3b96adabbb3955a65de55e1e10166aceef676991fe56aafad18fa459d2b706ba234e6692384400dbed47c27b863a217009b9
-
SSDEEP
768:Y4rPIkz0ABBt5BeIPH/ceMdehVikgsGhbfk3p9g0MUnl+vb/ebWI17hhfCEX:mkzLz9/hMdyEkgsF3p9JMUnAT2a2hhfR
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 228 cfgload32.exe -
Drops file in System32 directory 19 IoCs
description ioc Process File created C:\Windows\SysWOW64\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe cfgload32.exe File created C:\Windows\SysWOW64\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe cfgload32.exe File created C:\Windows\SysWOW64\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe cfgload32.exe File opened for modification C:\Windows\SysWOW64\cfgload32.exe 5c093f72d1ac9fa97d0d5289655e7d74.exe File created C:\Windows\SysWOW64\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe cfgload32.exe File created C:\Windows\SysWOW64\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe cfgload32.exe File created C:\Windows\SysWOW64\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe cfgload32.exe File created C:\Windows\SysWOW64\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe cfgload32.exe File created C:\Windows\SysWOW64\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe cfgload32.exe File created C:\Windows\SysWOW64\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe cfgload32.exe File created C:\Windows\SysWOW64\cfgload32.exe 5c093f72d1ac9fa97d0d5289655e7d74.exe File created C:\Windows\SysWOW64\cfgload32.exe cfgload32.exe File created C:\Windows\SysWOW64\cfgload32.exe\cfgload32.exe cfgload32.exe File created C:\Windows\SysWOW64\cfgload32.exe\cfgload32.exe\cfgload32.exe cfgload32.exe File created C:\Windows\SysWOW64\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe cfgload32.exe File created C:\Windows\SysWOW64\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe cfgload32.exe File created C:\Windows\SysWOW64\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe cfgload32.exe File created C:\Windows\SysWOW64\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe cfgload32.exe File created C:\Windows\SysWOW64\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe cfgload32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1508 5c093f72d1ac9fa97d0d5289655e7d74.exe 1508 5c093f72d1ac9fa97d0d5289655e7d74.exe 228 cfgload32.exe 228 cfgload32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 4676 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1508 wrote to memory of 228 1508 5c093f72d1ac9fa97d0d5289655e7d74.exe 91 PID 1508 wrote to memory of 228 1508 5c093f72d1ac9fa97d0d5289655e7d74.exe 91 PID 1508 wrote to memory of 228 1508 5c093f72d1ac9fa97d0d5289655e7d74.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c093f72d1ac9fa97d0d5289655e7d74.exe"C:\Users\Admin\AppData\Local\Temp\5c093f72d1ac9fa97d0d5289655e7d74.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\SysWOW64\cfgload32.exeC:\Windows\system32\cfgload32.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:228
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:3376
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4676
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46KB
MD55c093f72d1ac9fa97d0d5289655e7d74
SHA19b8fd11233416fe520cda2be289775850bbf3cd1
SHA2568aa82fd500e80cc53263f05b916ea7a4a0eb3ed5b54ce3ed98e02fff45d739f5
SHA512a7940f1505eef9e345f0f2d6a0eb3b96adabbb3955a65de55e1e10166aceef676991fe56aafad18fa459d2b706ba234e6692384400dbed47c27b863a217009b9