Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
03/02/2024, 20:58
Behavioral task
behavioral1
Sample
8d54f704168abaffd65eb870729daa49.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8d54f704168abaffd65eb870729daa49.exe
Resource
win10v2004-20231215-en
General
-
Target
8d54f704168abaffd65eb870729daa49.exe
-
Size
148KB
-
MD5
8d54f704168abaffd65eb870729daa49
-
SHA1
4e734a7c1da7b8d125c7c3bc8f29fd88a8ae2f23
-
SHA256
8f2fd44f1fba04b2b0f832e1dd30bc9142f8a6c2fa9efd26958f5313fe9c12d2
-
SHA512
87855a3318a456075a2693a573fb4328755e6bb83cef2bc3d3bedb257e39bea00c2672db205a5326fdc4b9e16477ca4c9df29454957497ae3a5a95d3ceef259b
-
SSDEEP
3072:NP0xWuJjbHRuvqW/3NRdPDxQWccFwEknZpLKKDpxULvdNboYyerZcJsz9v:RuWuxbsCW/3/dPDW4fknBxClNbFyerZl
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2696 nvchost.exe -
resource yara_rule behavioral2/memory/4896-0-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral2/files/0x0006000000023117-3.dat upx behavioral2/memory/4896-5-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral2/memory/2696-6-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral2/memory/2696-7-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral2/memory/2696-8-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral2/memory/2696-9-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral2/memory/2696-10-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral2/memory/2696-11-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral2/memory/2696-12-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral2/memory/2696-13-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral2/memory/2696-14-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral2/memory/2696-15-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral2/memory/2696-16-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral2/memory/2696-17-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral2/memory/2696-18-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral2/memory/2696-19-0x0000000000400000-0x000000000045F000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\winlogon = "C:\\Windows\\nvchost.exe" nvchost.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\nvchost.exe 8d54f704168abaffd65eb870729daa49.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2696 nvchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4896 wrote to memory of 2696 4896 8d54f704168abaffd65eb870729daa49.exe 84 PID 4896 wrote to memory of 2696 4896 8d54f704168abaffd65eb870729daa49.exe 84 PID 4896 wrote to memory of 2696 4896 8d54f704168abaffd65eb870729daa49.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\8d54f704168abaffd65eb870729daa49.exe"C:\Users\Admin\AppData\Local\Temp\8d54f704168abaffd65eb870729daa49.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Windows\nvchost.exeC:\Windows\nvchost.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:2696
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
148KB
MD58d54f704168abaffd65eb870729daa49
SHA14e734a7c1da7b8d125c7c3bc8f29fd88a8ae2f23
SHA2568f2fd44f1fba04b2b0f832e1dd30bc9142f8a6c2fa9efd26958f5313fe9c12d2
SHA51287855a3318a456075a2693a573fb4328755e6bb83cef2bc3d3bedb257e39bea00c2672db205a5326fdc4b9e16477ca4c9df29454957497ae3a5a95d3ceef259b