Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
28/01/2024, 12:14
Static task
static1
Behavioral task
behavioral1
Sample
7d190f333b8a42845e1455a439779504.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
7d190f333b8a42845e1455a439779504.exe
Resource
win10v2004-20231222-en
General
-
Target
7d190f333b8a42845e1455a439779504.exe
-
Size
22KB
-
MD5
7d190f333b8a42845e1455a439779504
-
SHA1
bf132c044d0b6e8823516be406baa7185ac05c8b
-
SHA256
bcfce76db4baa496bdf4566fa196665546a56d42eb8e29219c61e1fd27403403
-
SHA512
f9ecab40d6a41d837c3dd883705a8a8418619699f4eba3d843115ba6e94a390483028735a74642b0805b1f5ce9e0a1a10e9af3414859ba53cce9a01a51204a1c
-
SSDEEP
384:qNLGmTyfkn9f+MD/QswTKqs51qFR8htNc97NDG3HalEjE3MP9itgh1Tmj1K9DY54:qNLGKPYswTO5aRIc97N+aWo34oghQ1Kv
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4116 NTdhcp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\NTdhcp = "C:\\Windows\\system32\\NTdhcp.exe" 7d190f333b8a42845e1455a439779504.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\NTdhcp.exe 7d190f333b8a42845e1455a439779504.exe File opened for modification C:\Windows\SysWOW64\NTdhcp.exe 7d190f333b8a42845e1455a439779504.exe File opened for modification C:\Windows\SysWOW64\NTdhcp.exe NTdhcp.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Deleteme.bat 7d190f333b8a42845e1455a439779504.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5980 wrote to memory of 4116 5980 7d190f333b8a42845e1455a439779504.exe 86 PID 5980 wrote to memory of 4116 5980 7d190f333b8a42845e1455a439779504.exe 86 PID 5980 wrote to memory of 4116 5980 7d190f333b8a42845e1455a439779504.exe 86 PID 5980 wrote to memory of 4064 5980 7d190f333b8a42845e1455a439779504.exe 87 PID 5980 wrote to memory of 4064 5980 7d190f333b8a42845e1455a439779504.exe 87 PID 5980 wrote to memory of 4064 5980 7d190f333b8a42845e1455a439779504.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\7d190f333b8a42845e1455a439779504.exe"C:\Users\Admin\AppData\Local\Temp\7d190f333b8a42845e1455a439779504.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:5980 -
C:\Windows\SysWOW64\NTdhcp.exeC:\Windows\system32\NTdhcp.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4116
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\Deleteme.bat2⤵PID:4064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184B
MD5a9e211cc1f6a93e76ecf658732ec8f8e
SHA1e1fc82f690cc0536546cb7fb12dd37dfb157a053
SHA256d5577a8b5f1d5d1f42f92899ed36d03efba3a4653fe8d5c85b3ad0ac80ec7aaa
SHA512b520f46af1656e908860a1f44bc219d45daa7231493f368dc209838129e79e8d3dcd0548e4fff8ef61928c8d274f5b1f2e7a368daf51ce09823ccd2a03b7bb6b
-
Filesize
22KB
MD57d190f333b8a42845e1455a439779504
SHA1bf132c044d0b6e8823516be406baa7185ac05c8b
SHA256bcfce76db4baa496bdf4566fa196665546a56d42eb8e29219c61e1fd27403403
SHA512f9ecab40d6a41d837c3dd883705a8a8418619699f4eba3d843115ba6e94a390483028735a74642b0805b1f5ce9e0a1a10e9af3414859ba53cce9a01a51204a1c