Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/01/2024, 20:45
Behavioral task
behavioral1
Sample
757a6b8e64225063b9719a0d5d5fcf56.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
757a6b8e64225063b9719a0d5d5fcf56.exe
Resource
win10v2004-20231215-en
General
-
Target
757a6b8e64225063b9719a0d5d5fcf56.exe
-
Size
420KB
-
MD5
757a6b8e64225063b9719a0d5d5fcf56
-
SHA1
a75e22962e39e72a67de8ca8808206d2e5393122
-
SHA256
b51401a278eaf87460c80e7f6abae2dd56b4fd72f7e6280318aa3a4c86bccaa8
-
SHA512
dacaf24f613ef9cbf1de9e1c5d5d114e52d2e2b2702b44832439b192cfde12a9efd15b7c1f0b59b89dcea2317ba7bb930bbcf8c165895fcfeadf92cd0de1c996
-
SSDEEP
12288:IsXN7e9Rd9ygbEkQRzq7YJxp217Zrq7Jr9ejIx+qN6:IyVi9yK7Yvwvq7ejDE
Malware Config
Signatures
-
resource yara_rule behavioral2/files/0x000700000002321f-3.dat aspack_v212_v242 -
Executes dropped EXE 1 IoCs
pid Process 5112 EExplorer.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Laz = "C:\\Windows\\EExplorer.exe" 757a6b8e64225063b9719a0d5d5fcf56.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\EExplorer.exe 757a6b8e64225063b9719a0d5d5fcf56.exe File opened for modification C:\Windows\EExplorer.exe 757a6b8e64225063b9719a0d5d5fcf56.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4688 wrote to memory of 5112 4688 757a6b8e64225063b9719a0d5d5fcf56.exe 84 PID 4688 wrote to memory of 5112 4688 757a6b8e64225063b9719a0d5d5fcf56.exe 84 PID 4688 wrote to memory of 5112 4688 757a6b8e64225063b9719a0d5d5fcf56.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\757a6b8e64225063b9719a0d5d5fcf56.exe"C:\Users\Admin\AppData\Local\Temp\757a6b8e64225063b9719a0d5d5fcf56.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Windows\EExplorer.exeC:\Windows\EExplorer.exe2⤵
- Executes dropped EXE
PID:5112
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
420KB
MD5757a6b8e64225063b9719a0d5d5fcf56
SHA1a75e22962e39e72a67de8ca8808206d2e5393122
SHA256b51401a278eaf87460c80e7f6abae2dd56b4fd72f7e6280318aa3a4c86bccaa8
SHA512dacaf24f613ef9cbf1de9e1c5d5d114e52d2e2b2702b44832439b192cfde12a9efd15b7c1f0b59b89dcea2317ba7bb930bbcf8c165895fcfeadf92cd0de1c996