Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12/02/2024, 05:26
Static task
static1
Behavioral task
behavioral1
Sample
965c28adeb669aa74549e117c176e3be.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
965c28adeb669aa74549e117c176e3be.exe
Resource
win10v2004-20231215-en
General
-
Target
965c28adeb669aa74549e117c176e3be.exe
-
Size
1.0MB
-
MD5
965c28adeb669aa74549e117c176e3be
-
SHA1
70b5f0583a2973219f9b187e2bed8404be5aeb3a
-
SHA256
9e1ae3b4e55a48aa40649622e37d4322f761c91feb5db2d6620449217cb38fd7
-
SHA512
99c3de0116ba6847a6a1dc569e3f58a635900a9aaa9e9109a968d63f0c939cbb7af782d4094aac59b2b6abfc5530844b9c6fcfe9026dc795bafb12b6501bae20
-
SSDEEP
12288:zKz0viabdAm4EhAhRw95PxS0mVEwe96AkzCdcH8uSS64tBaQsh6DQ+m6brTQS4N8:zE+Amy0mg5kzCxKF26bQSsTzs7
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 965c28adeb669aa74549e117c176e3be.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\DirectX For Microsoft® Windows = "C:\\Windows\\system32\\dtxservice.exe -atm" 965c28adeb669aa74549e117c176e3be.exe -
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x0006000000023218-34.dat acprotect -
resource yara_rule behavioral2/files/0x000600000002321a-29.dat aspack_v212_v242 behavioral2/files/0x0006000000023217-19.dat aspack_v212_v242 -
Executes dropped EXE 5 IoCs
pid Process 4252 dtxservice.exe 3660 fps.exe 3164 mps.exe 868 iss32.exe 2996 CRSS.EXE -
Loads dropped DLL 2 IoCs
pid Process 2996 CRSS.EXE 4252 dtxservice.exe -
resource yara_rule behavioral2/files/0x0006000000023219-23.dat upx behavioral2/memory/868-25-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral2/memory/4252-37-0x0000000010000000-0x0000000010009000-memory.dmp upx behavioral2/files/0x0006000000023218-34.dat upx behavioral2/memory/868-26-0x0000000000400000-0x0000000000407000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DirectX For Microsoft® Windows = "C:\\Windows\\system32\\dtxservice.exe -atm" 965c28adeb669aa74549e117c176e3be.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\dtxservice.exe 965c28adeb669aa74549e117c176e3be.exe File opened for modification C:\Windows\SysWOW64\dtxservice.exe 965c28adeb669aa74549e117c176e3be.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File opened for modification C:\Windows\ktd32.atm CRSS.EXE File opened for modification C:\Windows\ktd32.atm dtxservice.exe File created C:\Windows\mps.exe dtxservice.exe File created C:\Windows\icq.dll dtxservice.exe File created C:\Windows\iss32.exe dtxservice.exe File created C:\Windows\CRSS.EXE dtxservice.exe File created C:\Windows\fps.atm fps.exe File created C:\Windows\fps.exe dtxservice.exe File created C:\Windows\kdd32.atm dtxservice.exe File created C:\Windows\kt.atm dtxservice.exe File created C:\Windows\mps.atm mps.exe -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dtxservice.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier dtxservice.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dtxservice.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier dtxservice.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dtxservice.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3196 965c28adeb669aa74549e117c176e3be.exe 3196 965c28adeb669aa74549e117c176e3be.exe 4252 dtxservice.exe 4252 dtxservice.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2996 CRSS.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3196 wrote to memory of 4252 3196 965c28adeb669aa74549e117c176e3be.exe 25 PID 3196 wrote to memory of 4252 3196 965c28adeb669aa74549e117c176e3be.exe 25 PID 3196 wrote to memory of 4252 3196 965c28adeb669aa74549e117c176e3be.exe 25 PID 4252 wrote to memory of 3660 4252 dtxservice.exe 36 PID 4252 wrote to memory of 3660 4252 dtxservice.exe 36 PID 4252 wrote to memory of 3660 4252 dtxservice.exe 36 PID 4252 wrote to memory of 3164 4252 dtxservice.exe 39 PID 4252 wrote to memory of 3164 4252 dtxservice.exe 39 PID 4252 wrote to memory of 3164 4252 dtxservice.exe 39 PID 4252 wrote to memory of 868 4252 dtxservice.exe 38 PID 4252 wrote to memory of 868 4252 dtxservice.exe 38 PID 4252 wrote to memory of 868 4252 dtxservice.exe 38 PID 4252 wrote to memory of 2996 4252 dtxservice.exe 37 PID 4252 wrote to memory of 2996 4252 dtxservice.exe 37 PID 4252 wrote to memory of 2996 4252 dtxservice.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\965c28adeb669aa74549e117c176e3be.exe"C:\Users\Admin\AppData\Local\Temp\965c28adeb669aa74549e117c176e3be.exe"1⤵
- Adds policy Run key to start application
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Windows\SysWOW64\dtxservice.exeC:\Windows\system32\dtxservice.exe -atm2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4252 -
C:\Windows\fps.exeC:\Windows\fps.exe /stext C:\Windows\fps.atm3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3660
-
-
C:\Windows\CRSS.EXEC:\Windows\CRSS.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:2996
-
-
C:\Windows\iss32.exeC:\Windows\iss32.exe3⤵
- Executes dropped EXE
PID:868
-
-
C:\Windows\mps.exeC:\Windows\mps.exe /stext C:\Windows\mps.atm3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3164
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13KB
MD5067c3c377e0346290862dc8791e81fb0
SHA19a4d3a6ad5fd102eb32a6f1229c80c15dc495409
SHA25618cbf1415419f9f27425cea06c32e9a2f041ec52a39d78d58922efbb698b9d76
SHA5120c0f0a1e4144accb97d159096cbd4003e77ca0ac792727002c2fe402dc12471a16e90ae3622f1f96d25a333af36a4dccbe80a6689bed080ba32e28dd845960aa
-
Filesize
10KB
MD5a34e40eef9a5babf10b532916b5da83c
SHA1618481c13d695e9f80a6a59196ee63b2fabb1532
SHA256ffc3ad27a0772f990ca7142a9a70f1073fb1b7712a642cf269460fb9209f8191
SHA512fa4dd73f2f8dbf5f5bef7d9e274885ea0f02a8334008fe0e159a3bf9c28c825d246ae39ff2d606e4a75c170381d991eda52ed119b99192ab5a4b0994a3576e3e
-
Filesize
9KB
MD55c2bbe341a9028f5b7ba3369a926f51d
SHA16d8632e136ceee52f4040972c660caa88fd4afac
SHA25604b2441fa3bd589b346cbb52c532fb48bc8e67fbb7b7bb5f1a4992ed68e9cab3
SHA512ab97430dbbe2f10f4ac3a92000cb5b281d836c88c89aed91d2daa6d9804bb3fa5892ef3b53f602fafb1134a14d4d9865f12b29295d34b3b2f1896bef7fe7520b
-
Filesize
14KB
MD516d0b87ea242e563ccbf13fbfc279915
SHA1a56a456b48f5318ca57cce4d75e2f0e3493850d4
SHA2561a4cef71598d42e1765c89fa5f0d91141e313c89d25418d7dc5e2b4b9bfc07aa
SHA512ee9b92a5c17bcf17812d18bb9f0e993537a9a1c1bb4938442aef9005046c4547be61380cf5cf01c7a710b07d5d0e116a4a8e8263d3ad73fef1e0c1de196f6cc0
-
Filesize
7KB
MD507fbfe41f346165ddf49ff1a0efac0c6
SHA110355863e48ab258fcd9e2db2218d717b9b95d5e
SHA256fbc2717905a942d8489c66603c03ffcc94e7b643caa3e343a7b4d4da5f115093
SHA5122893228f10fb1c41dcafe4132d25e9cf42af608168a5726961e0030334dd57e697d99998032bb50710ea27463fb6c9899341b0cf2a004bedac7cbb0aea00a2e4
-
Filesize
3KB
MD5d36a7e657fb830da92a59bccb67948a5
SHA1730d2499b9ffffa7a3e29b9f973728f2c9547827
SHA2560f855337f81800b5df27abd91f85c9a4187ac553e0a65b2a9719d5db1df08b39
SHA5120a24a2f87fcf35937520bde130862af7f40b3fcb29c8f09a197faa5e11a33b7db35b765b2494f719b28ef51060add5324aff441a825a3c87287fa64665e140c8
-
Filesize
8KB
MD551abb91f79fc8057f9ac61877fb480d5
SHA142790a05bb6cc05292977d70bf9ae60350aca1d7
SHA2566bd988e0c55f611e20ff740c76870dc892505725e9852580fe23bade1a8978fa
SHA5124b115ec069cecd082e72c5728aab8902ee018705ed9ad11731e47efd0f6d5d8e2412485d4713cb4ab20bfdd3d03f5919b2bb60a361af6ac69e7566a4fc015413
-
Filesize
29B
MD5d4d0a66ac4c1820c90f62f77099b547a
SHA1c8f96649ec9865804efc925472b931005925f3ff
SHA256997394c51fb18768bbb7a8e6cfe7bdec1efa0bdd82ed3507f3f1cc46ab459ff1
SHA5129ab9b7d786bdbd2e5bd596060930c64ee1496cbdf423bd283fbecee13501adeb149d4aa7290d410dd153a255ef6513e6a8356a88740efa4badb3190fb5388ebb
-
Filesize
17KB
MD54bad43105d4d557ae90d2f094e4bb833
SHA11d80ae0e7806c6cb2425131604373acb62ef8991
SHA256918d1c42a73d79c4296f8fe3683070803916df4f5a236e84aabf665215e266e2
SHA512278a11bb0fb2f17b91e1dc63d6b9a6376c332a41fdcedcd55d96b208b39b769e7edd1f41a614a80e24f409ba098a06b3da6848a6ab9ad0ff37e5154376ef681c