Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/01/2024, 18:56

General

  • Target

    6358a73cfceb5b53a7ae122d99a2c228.exe

  • Size

    137KB

  • MD5

    6358a73cfceb5b53a7ae122d99a2c228

  • SHA1

    43ad6700e71236ba0d7b8cf54bb9d48f73e460f9

  • SHA256

    dd93817d78ccfbecdc314d9b3183a2eebee12a89c3c070bbafd4ee80ac258812

  • SHA512

    dfd4e02e7bee9b23039c47342f05a021b645b4e3972bf40c2f89c16cf3b45c65ef482aeb32b66b64341e04a39187fe909ac268d7cd01c1b8f1b07a2739f23124

  • SSDEEP

    1536:qbnGysPZixQ5rIN4xunD7TFDIblyBoNHAILzo3w9mVIZVVU7xSD/Yfrb6GhjYlWf:0xIWQhPxivyJqoSI/mVQUtrrSkKMCe

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Suspicious use of WriteProcessMemory 37 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6358a73cfceb5b53a7ae122d99a2c228.exe
    "C:\Users\Admin\AppData\Local\Temp\6358a73cfceb5b53a7ae122d99a2c228.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3476
    • C:\Users\Admin\AppData\Local\Temp\6358a73cfceb5b53a7ae122d99a2c228.exe
      "C:\Users\Admin\AppData\Local\Temp\6358a73cfceb5b53a7ae122d99a2c228.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:840
      • C:\Users\Admin\AppData\Local\Temp\6358a73cfceb5b53a7ae122d99a2c228.exe
        "C:\Users\Admin\AppData\Local\Temp\6358a73cfceb5b53a7ae122d99a2c228.exe"
        3⤵
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:752
        • C:\Users\Admin\AppData\Roaming\netprotocol.exe
          C:\Users\Admin\AppData\Roaming\netprotocol.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:3592
          • C:\Users\Admin\AppData\Roaming\netprotocol.exe
            C:\Users\Admin\AppData\Roaming\netprotocol.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2756
            • C:\Users\Admin\AppData\Roaming\netprotocol.exe
              C:\Users\Admin\AppData\Roaming\netprotocol.exe
              6⤵
              • Executes dropped EXE
              PID:1724

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\6edh2hV4g6db943.tmp

    Filesize

    3KB

    MD5

    95f62965058baacadb83c2da94ca47de

    SHA1

    b3115c8b56105e1eae02fda8b3536b3bf38436ca

    SHA256

    d76b2bde3f59d34dbf1bba5917bfd17470703801b17984ad90b6cebcf914deb9

    SHA512

    9fbd110938f1c0a97b1f2742c8233e28a7e2802477f9222d3e0db95c1959ed3a1183b57ca1c92f006e6dbdf3ab03297cba0c6e06e2e2778a6dfa1e4ac2d7cb77

  • C:\Users\Admin\AppData\Roaming\netprotocol.exe

    Filesize

    137KB

    MD5

    2bb11b24670b744ab7517246b7e626fe

    SHA1

    e6becfbdc9a5b41e39d8252aa135f6e59956a25c

    SHA256

    0ee3d6af19c6849155568151ed704d2eac0b07545a07029913e651355168f0fb

    SHA512

    b656990ea5ccf501b5efddaba3cea0f960e469ea6541aec1cc0f72d45de0cf2ea5d5316b629d742e5151d9a20b84ef8a35c95b8f242b2371f180e22cf847ba0d

  • memory/752-8-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB

  • memory/752-9-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB

  • memory/752-10-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB

  • memory/752-33-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB

  • memory/840-4-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/840-6-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/840-7-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/1724-28-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB

  • memory/1724-29-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB

  • memory/1724-34-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB