Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
14/02/2024, 02:41
Static task
static1
Behavioral task
behavioral1
Sample
9a8be7dced7db6bdadf71c679ebb6085.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9a8be7dced7db6bdadf71c679ebb6085.exe
Resource
win10v2004-20231215-en
General
-
Target
9a8be7dced7db6bdadf71c679ebb6085.exe
-
Size
15KB
-
MD5
9a8be7dced7db6bdadf71c679ebb6085
-
SHA1
7535f252f7c089d1d6f0683f00e64801e79a4552
-
SHA256
88f5a20dfe06daf902674823449918d1debd3c51e7d834cc55f5d48118abe407
-
SHA512
d3163d570db58b71b7a85862818da3c90a96a043def25c97d01e3c32816e6bc877f6b707a2e3cf4f141f6edef1c695dd8a1b87d14d2d480bebd34f9b8fd3dcc8
-
SSDEEP
384:fP6hFdXgqHYaW7vdX5UdNMLLD33iDWiMmQKuTKzp+I:fP6hFZdYj1LLb3iCiMsuTKP
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4420 svchost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Windows\\svchost.exe" svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\svchost.exe 9a8be7dced7db6bdadf71c679ebb6085.exe File opened for modification C:\Windows\svchost.exe 9a8be7dced7db6bdadf71c679ebb6085.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3420 wrote to memory of 4420 3420 9a8be7dced7db6bdadf71c679ebb6085.exe 85 PID 3420 wrote to memory of 4420 3420 9a8be7dced7db6bdadf71c679ebb6085.exe 85 PID 3420 wrote to memory of 4420 3420 9a8be7dced7db6bdadf71c679ebb6085.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\9a8be7dced7db6bdadf71c679ebb6085.exe"C:\Users\Admin\AppData\Local\Temp\9a8be7dced7db6bdadf71c679ebb6085.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Windows\svchost.exeC:\Windows\svchost.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4420
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD59a8be7dced7db6bdadf71c679ebb6085
SHA17535f252f7c089d1d6f0683f00e64801e79a4552
SHA25688f5a20dfe06daf902674823449918d1debd3c51e7d834cc55f5d48118abe407
SHA512d3163d570db58b71b7a85862818da3c90a96a043def25c97d01e3c32816e6bc877f6b707a2e3cf4f141f6edef1c695dd8a1b87d14d2d480bebd34f9b8fd3dcc8