Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
14/02/2024, 07:26
Static task
static1
Behavioral task
behavioral1
Sample
9b1c5e213343e23ac6190ca278ee9163.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9b1c5e213343e23ac6190ca278ee9163.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
IEButtons.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
IEButtons.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral5
Sample
Uninstall.exe
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
Uninstall.exe
Resource
win10v2004-20231215-en
General
-
Target
Uninstall.exe
-
Size
49KB
-
MD5
12d142eed66034c47a21faa8caa04771
-
SHA1
f9491a8f6d249ba2feb3a0adff56e42cc23238d8
-
SHA256
cd1be9e15063dae16994666fb09cab48a23b9fbff263ee8abde8edb6cbc99e77
-
SHA512
ad17572f259f8fb77ba180011cc76f66fa212316df47f65ccf3e21f17a9e9c54126811893bf9bcd160c86b579fb404e0dceebd6e8eb4ee03b4b82461cbf4b40a
-
SSDEEP
768:zb4s6pIH65JbQRY63LVCIvFAUKWO95EnNz0D3VFS6sWkJq+eJRn5Am6kRRJ2iZ3f:njLaMv3xnCwNz0DxkJBqAELVigGKJ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1560 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 1 IoCs
resource yara_rule behavioral6/files/0x00060000000231eb-3.dat nsis_installer_1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4524 wrote to memory of 1560 4524 Uninstall.exe 85 PID 4524 wrote to memory of 1560 4524 Uninstall.exe 85 PID 4524 wrote to memory of 1560 4524 Uninstall.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
PID:1560
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
49KB
MD512d142eed66034c47a21faa8caa04771
SHA1f9491a8f6d249ba2feb3a0adff56e42cc23238d8
SHA256cd1be9e15063dae16994666fb09cab48a23b9fbff263ee8abde8edb6cbc99e77
SHA512ad17572f259f8fb77ba180011cc76f66fa212316df47f65ccf3e21f17a9e9c54126811893bf9bcd160c86b579fb404e0dceebd6e8eb4ee03b4b82461cbf4b40a