Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
17/01/2024, 18:56
Static task
static1
Behavioral task
behavioral1
Sample
6358a73cfceb5b53a7ae122d99a2c228.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
6358a73cfceb5b53a7ae122d99a2c228.exe
Resource
win10v2004-20231222-en
General
-
Target
6358a73cfceb5b53a7ae122d99a2c228.exe
-
Size
137KB
-
MD5
6358a73cfceb5b53a7ae122d99a2c228
-
SHA1
43ad6700e71236ba0d7b8cf54bb9d48f73e460f9
-
SHA256
dd93817d78ccfbecdc314d9b3183a2eebee12a89c3c070bbafd4ee80ac258812
-
SHA512
dfd4e02e7bee9b23039c47342f05a021b645b4e3972bf40c2f89c16cf3b45c65ef482aeb32b66b64341e04a39187fe909ac268d7cd01c1b8f1b07a2739f23124
-
SSDEEP
1536:qbnGysPZixQ5rIN4xunD7TFDIblyBoNHAILzo3w9mVIZVVU7xSD/Yfrb6GhjYlWf:0xIWQhPxivyJqoSI/mVQUtrrSkKMCe
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 3592 netprotocol.exe 2756 netprotocol.exe 1724 netprotocol.exe -
Loads dropped DLL 2 IoCs
pid Process 3476 6358a73cfceb5b53a7ae122d99a2c228.exe 3592 netprotocol.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Netprotocol = "C:\\Users\\Admin\\AppData\\Roaming\\netprotocol.exe" 6358a73cfceb5b53a7ae122d99a2c228.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3476 set thread context of 840 3476 6358a73cfceb5b53a7ae122d99a2c228.exe 95 PID 840 set thread context of 752 840 6358a73cfceb5b53a7ae122d99a2c228.exe 96 PID 3592 set thread context of 2756 3592 netprotocol.exe 101 PID 2756 set thread context of 1724 2756 netprotocol.exe 102 -
Suspicious use of WriteProcessMemory 37 IoCs
description pid Process procid_target PID 3476 wrote to memory of 840 3476 6358a73cfceb5b53a7ae122d99a2c228.exe 95 PID 3476 wrote to memory of 840 3476 6358a73cfceb5b53a7ae122d99a2c228.exe 95 PID 3476 wrote to memory of 840 3476 6358a73cfceb5b53a7ae122d99a2c228.exe 95 PID 3476 wrote to memory of 840 3476 6358a73cfceb5b53a7ae122d99a2c228.exe 95 PID 3476 wrote to memory of 840 3476 6358a73cfceb5b53a7ae122d99a2c228.exe 95 PID 3476 wrote to memory of 840 3476 6358a73cfceb5b53a7ae122d99a2c228.exe 95 PID 3476 wrote to memory of 840 3476 6358a73cfceb5b53a7ae122d99a2c228.exe 95 PID 3476 wrote to memory of 840 3476 6358a73cfceb5b53a7ae122d99a2c228.exe 95 PID 3476 wrote to memory of 840 3476 6358a73cfceb5b53a7ae122d99a2c228.exe 95 PID 840 wrote to memory of 752 840 6358a73cfceb5b53a7ae122d99a2c228.exe 96 PID 840 wrote to memory of 752 840 6358a73cfceb5b53a7ae122d99a2c228.exe 96 PID 840 wrote to memory of 752 840 6358a73cfceb5b53a7ae122d99a2c228.exe 96 PID 840 wrote to memory of 752 840 6358a73cfceb5b53a7ae122d99a2c228.exe 96 PID 840 wrote to memory of 752 840 6358a73cfceb5b53a7ae122d99a2c228.exe 96 PID 840 wrote to memory of 752 840 6358a73cfceb5b53a7ae122d99a2c228.exe 96 PID 840 wrote to memory of 752 840 6358a73cfceb5b53a7ae122d99a2c228.exe 96 PID 840 wrote to memory of 752 840 6358a73cfceb5b53a7ae122d99a2c228.exe 96 PID 752 wrote to memory of 3592 752 6358a73cfceb5b53a7ae122d99a2c228.exe 97 PID 752 wrote to memory of 3592 752 6358a73cfceb5b53a7ae122d99a2c228.exe 97 PID 752 wrote to memory of 3592 752 6358a73cfceb5b53a7ae122d99a2c228.exe 97 PID 3592 wrote to memory of 2756 3592 netprotocol.exe 101 PID 3592 wrote to memory of 2756 3592 netprotocol.exe 101 PID 3592 wrote to memory of 2756 3592 netprotocol.exe 101 PID 3592 wrote to memory of 2756 3592 netprotocol.exe 101 PID 3592 wrote to memory of 2756 3592 netprotocol.exe 101 PID 3592 wrote to memory of 2756 3592 netprotocol.exe 101 PID 3592 wrote to memory of 2756 3592 netprotocol.exe 101 PID 3592 wrote to memory of 2756 3592 netprotocol.exe 101 PID 3592 wrote to memory of 2756 3592 netprotocol.exe 101 PID 2756 wrote to memory of 1724 2756 netprotocol.exe 102 PID 2756 wrote to memory of 1724 2756 netprotocol.exe 102 PID 2756 wrote to memory of 1724 2756 netprotocol.exe 102 PID 2756 wrote to memory of 1724 2756 netprotocol.exe 102 PID 2756 wrote to memory of 1724 2756 netprotocol.exe 102 PID 2756 wrote to memory of 1724 2756 netprotocol.exe 102 PID 2756 wrote to memory of 1724 2756 netprotocol.exe 102 PID 2756 wrote to memory of 1724 2756 netprotocol.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\6358a73cfceb5b53a7ae122d99a2c228.exe"C:\Users\Admin\AppData\Local\Temp\6358a73cfceb5b53a7ae122d99a2c228.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Users\Admin\AppData\Local\Temp\6358a73cfceb5b53a7ae122d99a2c228.exe"C:\Users\Admin\AppData\Local\Temp\6358a73cfceb5b53a7ae122d99a2c228.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Users\Admin\AppData\Local\Temp\6358a73cfceb5b53a7ae122d99a2c228.exe"C:\Users\Admin\AppData\Local\Temp\6358a73cfceb5b53a7ae122d99a2c228.exe"3⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Users\Admin\AppData\Roaming\netprotocol.exeC:\Users\Admin\AppData\Roaming\netprotocol.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Users\Admin\AppData\Roaming\netprotocol.exeC:\Users\Admin\AppData\Roaming\netprotocol.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Users\Admin\AppData\Roaming\netprotocol.exeC:\Users\Admin\AppData\Roaming\netprotocol.exe6⤵
- Executes dropped EXE
PID:1724
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD595f62965058baacadb83c2da94ca47de
SHA1b3115c8b56105e1eae02fda8b3536b3bf38436ca
SHA256d76b2bde3f59d34dbf1bba5917bfd17470703801b17984ad90b6cebcf914deb9
SHA5129fbd110938f1c0a97b1f2742c8233e28a7e2802477f9222d3e0db95c1959ed3a1183b57ca1c92f006e6dbdf3ab03297cba0c6e06e2e2778a6dfa1e4ac2d7cb77
-
Filesize
137KB
MD52bb11b24670b744ab7517246b7e626fe
SHA1e6becfbdc9a5b41e39d8252aa135f6e59956a25c
SHA2560ee3d6af19c6849155568151ed704d2eac0b07545a07029913e651355168f0fb
SHA512b656990ea5ccf501b5efddaba3cea0f960e469ea6541aec1cc0f72d45de0cf2ea5d5316b629d742e5151d9a20b84ef8a35c95b8f242b2371f180e22cf847ba0d