Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
18/01/2024, 01:22
Behavioral task
behavioral1
Sample
641c6fb84810707c46796249f937093e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
641c6fb84810707c46796249f937093e.exe
Resource
win10v2004-20231215-en
General
-
Target
641c6fb84810707c46796249f937093e.exe
-
Size
14KB
-
MD5
641c6fb84810707c46796249f937093e
-
SHA1
0fd064136aa1dba8a6035d879b16beedcfb66477
-
SHA256
d5b074815c82a4c40fc66cb5f39ba8e06c08703f7f19c4259d48d406f3b4a5db
-
SHA512
b13110d66966e4f55dc8de2b1933ab76a7d142c292eb97c757a5a7424bf3813488f005a36375932476d7dc87f714f2b5bfd349e3fe4d3db914e63091463b5825
-
SSDEEP
384:s9bC8jZfXqHVR97epUeI4xp9Lw1iPL643mNc:Kb7lfXq1v2TPj98iPL643mN
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 64 kodensk.exe -
resource yara_rule behavioral2/memory/1984-0-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral2/files/0x0006000000023203-4.dat upx behavioral2/memory/1984-6-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral2/memory/64-7-0x0000000000400000-0x000000000040F000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\kodens.dll 641c6fb84810707c46796249f937093e.exe File created C:\Windows\SysWOW64\kodensk.exe 641c6fb84810707c46796249f937093e.exe File opened for modification C:\Windows\SysWOW64\kodensk.exe 641c6fb84810707c46796249f937093e.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1984 wrote to memory of 64 1984 641c6fb84810707c46796249f937093e.exe 87 PID 1984 wrote to memory of 64 1984 641c6fb84810707c46796249f937093e.exe 87 PID 1984 wrote to memory of 64 1984 641c6fb84810707c46796249f937093e.exe 87 PID 1984 wrote to memory of 4164 1984 641c6fb84810707c46796249f937093e.exe 97 PID 1984 wrote to memory of 4164 1984 641c6fb84810707c46796249f937093e.exe 97 PID 1984 wrote to memory of 4164 1984 641c6fb84810707c46796249f937093e.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\641c6fb84810707c46796249f937093e.exe"C:\Users\Admin\AppData\Local\Temp\641c6fb84810707c46796249f937093e.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\kodensk.exeC:\Windows\system32\kodensk.exe ˜‰2⤵
- Executes dropped EXE
PID:64
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\641c6fb84810707c46796249f937093e.exe.bat2⤵PID:4164
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
182B
MD5d06fc6cfacc986d1608833de18773bad
SHA10610f9b5d239bfee429fc6def3e3d542ffd963ba
SHA2564256018d9c473cd9eece4b25619dc185dd40d0cd529a2fa2919cc098e455a5d3
SHA5123771c577db2b7a88e7f99ab36cddfb6c6429659b9f765ca8d276826c8e0a62f51ad48454662d618844e1d335af8efa25c05e37a9c13ad595cd6de1a97db5f97b
-
Filesize
14KB
MD5641c6fb84810707c46796249f937093e
SHA10fd064136aa1dba8a6035d879b16beedcfb66477
SHA256d5b074815c82a4c40fc66cb5f39ba8e06c08703f7f19c4259d48d406f3b4a5db
SHA512b13110d66966e4f55dc8de2b1933ab76a7d142c292eb97c757a5a7424bf3813488f005a36375932476d7dc87f714f2b5bfd349e3fe4d3db914e63091463b5825