Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/01/2024, 07:22
Static task
static1
Behavioral task
behavioral1
Sample
76bc047ad4ba6c2667ed9dfbfe5e0e6f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
76bc047ad4ba6c2667ed9dfbfe5e0e6f.exe
Resource
win10v2004-20231215-en
General
-
Target
76bc047ad4ba6c2667ed9dfbfe5e0e6f.exe
-
Size
594KB
-
MD5
76bc047ad4ba6c2667ed9dfbfe5e0e6f
-
SHA1
9f8f33b8032b3f532282ab1ca6310f781f4a641e
-
SHA256
92a51390713465d6370c27575ede39dda9097144081eb0daf916fdfeb7ca1049
-
SHA512
fc349c32c975c3b8445fc138646969c90ac14348bed88338327b648fbc0faa9465f797fa27ab431aae63d97c99cc589376da17e50c2006cb007715e55ac022e4
-
SSDEEP
12288:Frp/OYD6GzozbigFc6kF3Z4mxx+laSsuEXAVDZoSD:FrF36EozbRc9QmX+ltsuEWWg
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4672 G_Server1.23.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\G_Server1.23.exe 76bc047ad4ba6c2667ed9dfbfe5e0e6f.exe File opened for modification C:\Windows\G_Server1.23.exe 76bc047ad4ba6c2667ed9dfbfe5e0e6f.exe File created C:\Windows\Delete.bat 76bc047ad4ba6c2667ed9dfbfe5e0e6f.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ G_Server1.23.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" G_Server1.23.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" G_Server1.23.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" G_Server1.23.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" G_Server1.23.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4672 G_Server1.23.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3704 wrote to memory of 4260 3704 76bc047ad4ba6c2667ed9dfbfe5e0e6f.exe 88 PID 3704 wrote to memory of 4260 3704 76bc047ad4ba6c2667ed9dfbfe5e0e6f.exe 88 PID 3704 wrote to memory of 4260 3704 76bc047ad4ba6c2667ed9dfbfe5e0e6f.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\76bc047ad4ba6c2667ed9dfbfe5e0e6f.exe"C:\Users\Admin\AppData\Local\Temp\76bc047ad4ba6c2667ed9dfbfe5e0e6f.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\Delete.bat2⤵PID:4260
-
-
C:\Windows\G_Server1.23.exeC:\Windows\G_Server1.23.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of FindShellTrayWindow
PID:4672
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
186B
MD570c348f61937ff9790caefb8125741b7
SHA1c13705f440ec8a6bb1091adecabe138995cc6e54
SHA256ae83e3828532d71f7feb068dd8f06f0b643894feea3ab7b3253020d5158cb919
SHA51201817fde9cd95814238b77e8404a6004681990f2e13d2c7a199abb2b595c514577bb0b6961079a71f1c4702abe2e68b13aac7e001b71dafa475669f4d6b0a119
-
Filesize
594KB
MD576bc047ad4ba6c2667ed9dfbfe5e0e6f
SHA19f8f33b8032b3f532282ab1ca6310f781f4a641e
SHA25692a51390713465d6370c27575ede39dda9097144081eb0daf916fdfeb7ca1049
SHA512fc349c32c975c3b8445fc138646969c90ac14348bed88338327b648fbc0faa9465f797fa27ab431aae63d97c99cc589376da17e50c2006cb007715e55ac022e4
-
Filesize
591KB
MD5bb6d1d9129b582bd695d3ae0f5808c1d
SHA13ba5f08da076619ee31bbacd9c01ff9c4a960330
SHA2563b6fbe95268d664646d3a73b1b56bd05261cc298a8301867e64237c2aa403674
SHA5128d32a0567f7a1e9323d332ab1067e2d5b4a6acfac0c44758136a8acb8202065f6ec91978aa71ad036eb6cc288d24a40907187b4b7bfb802708b6505116b659ca