Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
19/01/2024, 09:56
Behavioral task
behavioral1
Sample
6752f4178a9554f8aed55982a9776838.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6752f4178a9554f8aed55982a9776838.exe
Resource
win10v2004-20231222-en
General
-
Target
6752f4178a9554f8aed55982a9776838.exe
-
Size
10KB
-
MD5
6752f4178a9554f8aed55982a9776838
-
SHA1
11be215cbe3c3c037b38704875dc0160ed71ff5f
-
SHA256
cf2bccb31721b9ef9efe982b0ecc5ca5cdecded9dffb5ba0d87a45356da110a5
-
SHA512
42c147edb9cb4ee910c6a112f8084a9de4b4418d410c05adf768432f2422bfa51816950b0c389e5559709a3481b0a40fbb64bfd879304268cb4bbb84f5fc7030
-
SSDEEP
192:CDuFSHP37IQsDocCg3wPjdadrLVc7PG1KnoeSjKSBH1JXZl819/V3Z:4KSvrIQsD1APjdadrBEoHR1zl8b
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 3252 mduaeyk.exe -
resource yara_rule behavioral2/memory/1128-0-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral2/files/0x00080000000231f3-5.dat upx behavioral2/memory/1128-8-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral2/memory/3252-10-0x0000000000400000-0x000000000040E000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\mduaey.dll 6752f4178a9554f8aed55982a9776838.exe File created C:\Windows\SysWOW64\mduaeyk.exe 6752f4178a9554f8aed55982a9776838.exe File opened for modification C:\Windows\SysWOW64\mduaeyk.exe 6752f4178a9554f8aed55982a9776838.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1128 wrote to memory of 3252 1128 6752f4178a9554f8aed55982a9776838.exe 88 PID 1128 wrote to memory of 3252 1128 6752f4178a9554f8aed55982a9776838.exe 88 PID 1128 wrote to memory of 3252 1128 6752f4178a9554f8aed55982a9776838.exe 88 PID 1128 wrote to memory of 4748 1128 6752f4178a9554f8aed55982a9776838.exe 92 PID 1128 wrote to memory of 4748 1128 6752f4178a9554f8aed55982a9776838.exe 92 PID 1128 wrote to memory of 4748 1128 6752f4178a9554f8aed55982a9776838.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\6752f4178a9554f8aed55982a9776838.exe"C:\Users\Admin\AppData\Local\Temp\6752f4178a9554f8aed55982a9776838.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Windows\SysWOW64\mduaeyk.exeC:\Windows\system32\mduaeyk.exe ˜‰2⤵
- Executes dropped EXE
PID:3252
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\6752f4178a9554f8aed55982a9776838.exe.bat2⤵PID:4748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
182B
MD5c9c3b13441df428ba3444b661e36ab7f
SHA1c62e5063da3b7121051909f2dacc7b10d5c220ea
SHA2568814be29a650b4d906519834f5412907fb8b70d21be63c7f2eac21ab51007b15
SHA512a1cf35148e5c26d6d322409441bf8ec2a13b159f42a804999ffd5ce512ecc1da5123504320689a4dc9a5e04bf601a9d25b8191663aaabba8ec5637c4fe1995da
-
Filesize
10KB
MD56752f4178a9554f8aed55982a9776838
SHA111be215cbe3c3c037b38704875dc0160ed71ff5f
SHA256cf2bccb31721b9ef9efe982b0ecc5ca5cdecded9dffb5ba0d87a45356da110a5
SHA51242c147edb9cb4ee910c6a112f8084a9de4b4418d410c05adf768432f2422bfa51816950b0c389e5559709a3481b0a40fbb64bfd879304268cb4bbb84f5fc7030