Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
91s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12/02/2024, 06:14
Static task
static1
Behavioral task
behavioral1
Sample
9676324180e2624b259fdd443da55262.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9676324180e2624b259fdd443da55262.exe
Resource
win10v2004-20231215-en
General
-
Target
9676324180e2624b259fdd443da55262.exe
-
Size
10KB
-
MD5
9676324180e2624b259fdd443da55262
-
SHA1
b4c54624a4611def7a19ee4373d113cf53c4ebfd
-
SHA256
7053449b958e04e2ecde4c48f76fc76401226bb6d1ec1b384bcd4102e1557ced
-
SHA512
58f1461c9c923e3e6574e6a8201a12c6a8c4bb318de10a2e8cc6db6c011b6525fabb65b94371c43d1e5bde2aa727051df8d54388ded46373d78efa8aa61cb56d
-
SSDEEP
192:I+wLZcz3Jumy2/xRTNnqsLBg1Z9OZtE50lQ3gpdv4DkgUwu0D:I+wLZSJ2gtNnDLBnZaulQQpdwcGD
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\qjepri.dll 9676324180e2624b259fdd443da55262.exe File created C:\Windows\SysWOW64\qjepri.dll 9676324180e2624b259fdd443da55262.exe -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 9676324180e2624b259fdd443da55262.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{54123FF1-8371-9834-9021-184518451FA5} 9676324180e2624b259fdd443da55262.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{54123FF1-8371-9834-9021-184518451FA5}\InprocServer32\ = "C:\\Windows\\SysWow64\\qjepri.dll" 9676324180e2624b259fdd443da55262.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{54123FF1-8371-9834-9021-184518451FA5}\InprocServer32\ThreadingModel = "Apartment" 9676324180e2624b259fdd443da55262.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{54123FF1-8371-9834-9021-184518451FA5}\InprocServer32 9676324180e2624b259fdd443da55262.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 9676324180e2624b259fdd443da55262.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 60 9676324180e2624b259fdd443da55262.exe 60 9676324180e2624b259fdd443da55262.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 60 wrote to memory of 4532 60 9676324180e2624b259fdd443da55262.exe 84 PID 60 wrote to memory of 4532 60 9676324180e2624b259fdd443da55262.exe 84 PID 60 wrote to memory of 4532 60 9676324180e2624b259fdd443da55262.exe 84 PID 60 wrote to memory of 1340 60 9676324180e2624b259fdd443da55262.exe 87 PID 60 wrote to memory of 1340 60 9676324180e2624b259fdd443da55262.exe 87 PID 60 wrote to memory of 1340 60 9676324180e2624b259fdd443da55262.exe 87 PID 4532 wrote to memory of 5080 4532 cmd.exe 89 PID 4532 wrote to memory of 5080 4532 cmd.exe 89 PID 4532 wrote to memory of 5080 4532 cmd.exe 89 PID 1340 wrote to memory of 4052 1340 cmd.exe 88 PID 1340 wrote to memory of 4052 1340 cmd.exe 88 PID 1340 wrote to memory of 4052 1340 cmd.exe 88 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 4052 attrib.exe 5080 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9676324180e2624b259fdd443da55262.exe"C:\Users\Admin\AppData\Local\Temp\9676324180e2624b259fdd443da55262.exe"1⤵
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:60 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DeleteFileDos.bat2⤵
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp\9676324180e2624b259fdd443da55262.exe" -r -a -s -h3⤵
- Views/modifies file attributes
PID:5080
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DeleteFileDos.bat2⤵
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp\9676324180e2624b259fdd443da55262.exe" -r -a -s -h3⤵
- Views/modifies file attributes
PID:4052
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
290B
MD51f60912fd03b06564b0849a6707262ac
SHA1829e11a53c84076f92bae5cb86b53b81c19e5bee
SHA256368ad0092498922ef1f101e109dcb25116631ff1083f000d0a43627f7cb7b4e2
SHA5122cb32203d647923a54e1733ebb7a91315d20a21f7bf9f2990b65a9414fc88daa9946f54d3336d9763f87aeeb4ae2d1801b7d6d36334697d93d994b4b0856fa92
-
Filesize
15KB
MD533b499510b2b549df0e182064765cb0e
SHA141c6967e6114f191d3521641907bde616a1396cb
SHA2564ba8fac02244f88da0decb5b160a3857d53c918592da0c3f7d6a1629d7202651
SHA512632cf73e3f297609d87724b82025da44c1a8fb67c93a82a69f2a3e26e6682e2f2645e29dd1d5ff586fc7480920d880153789109db6bdb458148df10ea43095fd