Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/01/2024, 08:41

General

  • Target

    672e5f10ecf3c0b88fe1d55bc2e54388.exe

  • Size

    209KB

  • MD5

    672e5f10ecf3c0b88fe1d55bc2e54388

  • SHA1

    ca3172a9e0736c3731790d0208f9cc266b163abb

  • SHA256

    b51676e16dc59ac6fef3a8379113a783d22544a1b73246ffc20c670c24b30b3a

  • SHA512

    1cd53c198fe7d5d9ee0ea58f89376aa1f07234b4e51f7d8b72a7a845f1d04950671d688a9579f1473b72a194dd59cc515a954840cc6f8838f3448eca7efbafcc

  • SSDEEP

    6144:Ml7ur9z4AxnDCglaMtseU8p3ge92nOmxoeihUFxb5UT:195DC6vK38pR92joPeh5U

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\672e5f10ecf3c0b88fe1d55bc2e54388.exe
    "C:\Users\Admin\AppData\Local\Temp\672e5f10ecf3c0b88fe1d55bc2e54388.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1980
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\4D16.tmp\vir.bat""
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3476
      • C:\Users\Admin\AppData\Local\Temp\u.dll
        u.dll -bat vir.bat -save 672e5f10ecf3c0b88fe1d55bc2e54388.exe.com -include s.dll -overwrite -nodelete
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:544
        • C:\Users\Admin\AppData\Local\Temp\4DC2.tmp\mpress.exe
          "C:\Users\Admin\AppData\Local\Temp\4DC2.tmp\mpress.exe" "C:\Users\Admin\AppData\Local\Temp\exe4DC3.tmp"
          4⤵
          • Executes dropped EXE
          PID:4580

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\4D16.tmp\vir.bat

    Filesize

    1KB

    MD5

    1afd2c654753106c020221e15ea2421d

    SHA1

    961e0a1decab80b16456f30cd85f87042595917f

    SHA256

    730c6086b5868e101293cc65c7e176d3686c840abfeb4c3383e65e5db5648550

    SHA512

    258adf832ff4ac8c172640ec808b8aa56256e9f90c62bef93168be7bc4f3d7031e7b677707a8251c2ab440bff4533e836fb84af4ec5654e5964d33caf09a69f6

  • C:\Users\Admin\AppData\Local\Temp\4DC2.tmp\mpress.exe

    Filesize

    100KB

    MD5

    e42b81b9636152c78ba480c1c47d3c7f

    SHA1

    66a2fca3925428ee91ad9df5b76b90b34d28e0f8

    SHA256

    7c24c72439880e502be51da5d991b9b56a1af242b4eef4737f0f43b4a87546d2

    SHA512

    4b2986106325c5c3fe11ab460f646d4740eb85252aa191f2b84e29901fac146d7a82e31c72d39c38a70277f78278621ee506d9da2681f5019cd64c7df85cff6e

  • C:\Users\Admin\AppData\Local\Temp\exe4DC3.tmp

    Filesize

    41KB

    MD5

    dccc902dc69f9012016bfbeebaec2ab4

    SHA1

    9bb1965864382c768f42709d65999e8ab14af8b5

    SHA256

    6ef2e241ab78f7ed0389775aed3e394233a49f32634c9bb293e663e1ee381e37

    SHA512

    7b5ca3fe7b496a6b9b506ea477b72342c2d673278e9e7a1e73a257bf1847e926a866ff624995aee24ec9e871882b34bd2cdf5181a47ec047faa57bb7fe4c3086

  • C:\Users\Admin\AppData\Local\Temp\exe4DC3.tmp

    Filesize

    24KB

    MD5

    75c613a066f65857be61e90d4ea44435

    SHA1

    825db98cf1f56a88a3d2407f6b20ff8521a142a6

    SHA256

    2928b10cb3bd918ff461785fb55a8ae8b6fd3f281e03986b3a2d77ad798ebb4d

    SHA512

    292fd978eb0e6d1e809879396299401a8f41cc2f2a3ed2004c66c573e4b280baf333be8e5510dd46a8f7c837c641d9fbae108b7c1b2c4758ba16bd7b7e8671cd

  • C:\Users\Admin\AppData\Local\Temp\s.dll

    Filesize

    98KB

    MD5

    bdfac250d85b9960ecdd4d0456267653

    SHA1

    9bca2ca42a48e1b65104a7a9c42c6d8de77563b9

    SHA256

    b9f17523402685adb4f0b0c6b9539398a333f55ad711653dc53ae793773e72a5

    SHA512

    8a47108b6afc6fc39f937b67e778a11a4447e8dd70d23777beeb47b76c1b153d5d7039ff9bd05fb3e3076287c36a4affcb4dd5fd389f84bfba150ad0d8ca2451

  • C:\Users\Admin\AppData\Local\Temp\u.dll

    Filesize

    61KB

    MD5

    abe6470a9bb86e070ad07220f7a2063b

    SHA1

    6c76efc8eeb26fe08e7bd280fbdad4ee436acd22

    SHA256

    a71e8bd3f15a669f56cb6011f3772e2f455c08e2df6e692f746e9a045551613e

    SHA512

    89a6ee3cf2992fd292faef211eecd3aebce5608e1aacb8067e4a52a4b648cdeb840d86463121a3c2a58b680759d5d53b047dc719d6af89536e3441b87d666999

  • C:\Users\Admin\AppData\Local\Temp\u.dll

    Filesize

    26KB

    MD5

    17fc56916eb6bf71b2a5d5af50727adb

    SHA1

    ecd65110216b817a4ac2f6976efdb8a3f53d6cb2

    SHA256

    213cfa7f95d8de3b40033ac2f8a6446e3c27febc70a84332a9da68a92ec6dec3

    SHA512

    31ddce57966cd683d69732db5944a3cfc1bb1083c07fc8756787e12b60fdf915ff5f73b014323ff96a4787ced79ca1e20d0287af51cc218eb88fff81d0dca096

  • C:\Users\Admin\AppData\Local\Temp\u.dll

    Filesize

    33KB

    MD5

    6346a3dfdd4bf3b5a51ec5258b8f3375

    SHA1

    c40e354bdab845862de23c6aae7590082a1c40ce

    SHA256

    ba8edbaeae8d5d238847b508235dd636b6942eceb4deee23efa3b61d1106a838

    SHA512

    c635f2a170133e34552348c5fd5b00a02368cf36d06e2e1a616933c90def490bb5d2b69f2a182ee4fbae259821e3c2baea925af5b2e3dc531116c6129382d5d5

  • C:\Users\Admin\AppData\Local\Temp\vir.bat

    Filesize

    1KB

    MD5

    54c56605768ed989c31c213c77b28825

    SHA1

    84900d8e29bddf425bc061bd066590413d6fe96b

    SHA256

    810d7f4bba77bfc998e6b02c19342c5ea021e7b9bec2009657468bc6ed1beb50

    SHA512

    503e8239b3203671340e386dec5e5664c25dc091957e537cf4ecdb40f4a2b833447f1fb6801eb2193372bc113b8a5bcafde9f450b78ae5ba1999d187c6327e2b

  • memory/1980-0-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/1980-1-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/1980-71-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/4580-55-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/4580-63-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB