Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/01/2024, 21:08
Static task
static1
Behavioral task
behavioral1
Sample
72dc26bc38fedd86606e13e7c2015c2d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
72dc26bc38fedd86606e13e7c2015c2d.exe
Resource
win10v2004-20231215-en
General
-
Target
72dc26bc38fedd86606e13e7c2015c2d.exe
-
Size
8KB
-
MD5
72dc26bc38fedd86606e13e7c2015c2d
-
SHA1
afbb8d273e46083b574f984823ecd82c0718c126
-
SHA256
95b6152a0b1def35e594162d42f00d5f1f09baeb155b96c23661fd08b6b1d462
-
SHA512
361a5700861e58c4873994c325b81cc9cedd15996746c581cc37e2cff9004ba1c36cc3941f62a9ab2b18d88a2729a4658ea5b4b333955001f819809d8929d728
-
SSDEEP
192:rLTXi8BFu6WPzD0pgEhnordBxBMBg3y/94KD9Vm3fYLlL4B:vTfFu6s6hoZBD13y/9/kfY5i
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4276 72dc26bc38fedd86606e13e7c2015c2d.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\72dc26bc38fedd86606e13e7c2015c2d.exe 72dc26bc38fedd86606e13e7c2015c2d.exe File opened for modification C:\Windows\SysWOW64\72dc26bc38fedd86606e13e7c2015c2d.exe 72dc26bc38fedd86606e13e7c2015c2d.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 472 72dc26bc38fedd86606e13e7c2015c2d.exe 472 72dc26bc38fedd86606e13e7c2015c2d.exe 472 72dc26bc38fedd86606e13e7c2015c2d.exe 472 72dc26bc38fedd86606e13e7c2015c2d.exe 472 72dc26bc38fedd86606e13e7c2015c2d.exe 472 72dc26bc38fedd86606e13e7c2015c2d.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 472 72dc26bc38fedd86606e13e7c2015c2d.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 472 wrote to memory of 1396 472 72dc26bc38fedd86606e13e7c2015c2d.exe 87 PID 472 wrote to memory of 1396 472 72dc26bc38fedd86606e13e7c2015c2d.exe 87 PID 472 wrote to memory of 1396 472 72dc26bc38fedd86606e13e7c2015c2d.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\72dc26bc38fedd86606e13e7c2015c2d.exe"C:\Users\Admin\AppData\Local\Temp\72dc26bc38fedd86606e13e7c2015c2d.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:472 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\72DC26~1.EXE > nul2⤵PID:1396
-
-
C:\Windows\SysWOW64\72dc26bc38fedd86606e13e7c2015c2d.exeC:\Windows\SysWOW64\72dc26bc38fedd86606e13e7c2015c2d.exe1⤵
- Executes dropped EXE
PID:4276
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD572dc26bc38fedd86606e13e7c2015c2d
SHA1afbb8d273e46083b574f984823ecd82c0718c126
SHA25695b6152a0b1def35e594162d42f00d5f1f09baeb155b96c23661fd08b6b1d462
SHA512361a5700861e58c4873994c325b81cc9cedd15996746c581cc37e2cff9004ba1c36cc3941f62a9ab2b18d88a2729a4658ea5b4b333955001f819809d8929d728