Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04/02/2024, 04:45
Static task
static1
Behavioral task
behavioral1
Sample
8e3f27473d38855bcaf796affec58903.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8e3f27473d38855bcaf796affec58903.exe
Resource
win10v2004-20231215-en
General
-
Target
8e3f27473d38855bcaf796affec58903.exe
-
Size
693KB
-
MD5
8e3f27473d38855bcaf796affec58903
-
SHA1
0f97f5db8060b471e2c7cae522137d38161d37fa
-
SHA256
42250677cbe6504034f6b6519e8f27cfc142772abe476f88ca0f72eefde2dcb3
-
SHA512
e18c38b921aa958e97e8b021ff7c5cffaf1eff775fbef03513376197bc7559d22d1d609b09309cfbe1bd7b457d62a9d2715facf2a371966f0c1fb64a6e62af82
-
SSDEEP
12288:bzVJxyaw0nLCvyCcf8gtgd86JszHj27pTF3Z4mxxyDqVTVOCg:1vyALCg8g4mjupTQmXJVTzg
Malware Config
Signatures
-
resource yara_rule behavioral2/files/0x0007000000023135-28.dat aspack_v212_v242 -
Executes dropped EXE 2 IoCs
pid Process 2620 SERVER~1.EXE 1228 556.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8e3f27473d38855bcaf796affec58903.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\556.exe SERVER~1.EXE File opened for modification C:\Windows\556.exe SERVER~1.EXE File created C:\Windows\uninstal.bat SERVER~1.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2620 SERVER~1.EXE Token: SeDebugPrivilege 1228 556.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1228 556.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4140 wrote to memory of 2620 4140 8e3f27473d38855bcaf796affec58903.exe 84 PID 4140 wrote to memory of 2620 4140 8e3f27473d38855bcaf796affec58903.exe 84 PID 4140 wrote to memory of 2620 4140 8e3f27473d38855bcaf796affec58903.exe 84 PID 1228 wrote to memory of 2380 1228 556.exe 86 PID 1228 wrote to memory of 2380 1228 556.exe 86 PID 2620 wrote to memory of 2940 2620 SERVER~1.EXE 87 PID 2620 wrote to memory of 2940 2620 SERVER~1.EXE 87 PID 2620 wrote to memory of 2940 2620 SERVER~1.EXE 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e3f27473d38855bcaf796affec58903.exe"C:\Users\Admin\AppData\Local\Temp\8e3f27473d38855bcaf796affec58903.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SERVER~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SERVER~1.EXE2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\uninstal.bat3⤵PID:2940
-
-
-
C:\Windows\556.exeC:\Windows\556.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:2380
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
292KB
MD5af112722fa9a12a474fbc496d708dbf0
SHA1bcd366536306de1dcd91170832dfc1115214b146
SHA256b0c406012ea601046ada296c26fada0670f7fb2b41393b176dcc254b8d04ff8b
SHA512a9974cd6c3c43f622f19b35eb2872d0d72ef8ffcc5cd9c2eca8fdac9f20eecbed947ea0be8c4a64004b156c9228b418b01a4fe5a9c3d8b757ac5230570746d8f
-
Filesize
164B
MD5924ea7ae6df752587469376459875c51
SHA1ec5fa69c7e5dcaf5b57eefadc4f25a8e4ae073e1
SHA25646c715ac82d5774479b760757498ddb0b9f75cebc116a3da81f9e438bc9bbb09
SHA512ea7b176a411b82faf5fcd785c67180f88f9ff28f7e24c4f4b49f8e7cdc99fb60e38722b61547a4291bdd2c56b3729045c2e8d4afbecfe03612ab0dd8a7b6ae35