Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
14/02/2024, 09:43
Static task
static1
Behavioral task
behavioral1
Sample
9b58be9bb4a7ad40e9566bf2dc0b00a4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9b58be9bb4a7ad40e9566bf2dc0b00a4.exe
Resource
win10v2004-20231215-en
General
-
Target
9b58be9bb4a7ad40e9566bf2dc0b00a4.exe
-
Size
56KB
-
MD5
9b58be9bb4a7ad40e9566bf2dc0b00a4
-
SHA1
ba06ead2c310dcf42368c035bf27dbdb48c22c82
-
SHA256
2c4c47c5c1897a7e44603d80df4d9b0fca0fc014207a7b2a5aac17b32e83266d
-
SHA512
cd85ebf7f8e8707a71b359a13c8d318695eb7595ff9f43ac7256100773e628a17bc575feca61710e4bf7b846ff99c4a8aeecdf1523c5cf5f34492d5dd83e73c3
-
SSDEEP
768:8yIqMQHieHFLWEvA4Lbrl1rvs52bpdu5DjtZj06W62s9O9nCbpv46l61:7IqMQlHtfvrbp1fbTu5DjA+9k24V
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Z: 9b58be9bb4a7ad40e9566bf2dc0b00a4.exe File opened (read-only) \??\V: 9b58be9bb4a7ad40e9566bf2dc0b00a4.exe File opened (read-only) \??\I: 9b58be9bb4a7ad40e9566bf2dc0b00a4.exe File opened (read-only) \??\Y: 9b58be9bb4a7ad40e9566bf2dc0b00a4.exe File opened (read-only) \??\T: 9b58be9bb4a7ad40e9566bf2dc0b00a4.exe File opened (read-only) \??\R: 9b58be9bb4a7ad40e9566bf2dc0b00a4.exe File opened (read-only) \??\K: 9b58be9bb4a7ad40e9566bf2dc0b00a4.exe File opened (read-only) \??\H: 9b58be9bb4a7ad40e9566bf2dc0b00a4.exe File opened (read-only) \??\G: 9b58be9bb4a7ad40e9566bf2dc0b00a4.exe File opened (read-only) \??\P: 9b58be9bb4a7ad40e9566bf2dc0b00a4.exe File opened (read-only) \??\O: 9b58be9bb4a7ad40e9566bf2dc0b00a4.exe File opened (read-only) \??\N: 9b58be9bb4a7ad40e9566bf2dc0b00a4.exe File opened (read-only) \??\M: 9b58be9bb4a7ad40e9566bf2dc0b00a4.exe File opened (read-only) \??\L: 9b58be9bb4a7ad40e9566bf2dc0b00a4.exe File opened (read-only) \??\E: 9b58be9bb4a7ad40e9566bf2dc0b00a4.exe File opened (read-only) \??\X: 9b58be9bb4a7ad40e9566bf2dc0b00a4.exe File opened (read-only) \??\W: 9b58be9bb4a7ad40e9566bf2dc0b00a4.exe File opened (read-only) \??\U: 9b58be9bb4a7ad40e9566bf2dc0b00a4.exe File opened (read-only) \??\S: 9b58be9bb4a7ad40e9566bf2dc0b00a4.exe File opened (read-only) \??\Q: 9b58be9bb4a7ad40e9566bf2dc0b00a4.exe File opened (read-only) \??\J: 9b58be9bb4a7ad40e9566bf2dc0b00a4.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 3184 9b58be9bb4a7ad40e9566bf2dc0b00a4.exe 3184 9b58be9bb4a7ad40e9566bf2dc0b00a4.exe 3184 9b58be9bb4a7ad40e9566bf2dc0b00a4.exe 3184 9b58be9bb4a7ad40e9566bf2dc0b00a4.exe 3184 9b58be9bb4a7ad40e9566bf2dc0b00a4.exe 3184 9b58be9bb4a7ad40e9566bf2dc0b00a4.exe 3184 9b58be9bb4a7ad40e9566bf2dc0b00a4.exe 3184 9b58be9bb4a7ad40e9566bf2dc0b00a4.exe 3184 9b58be9bb4a7ad40e9566bf2dc0b00a4.exe 3184 9b58be9bb4a7ad40e9566bf2dc0b00a4.exe 3184 9b58be9bb4a7ad40e9566bf2dc0b00a4.exe 3184 9b58be9bb4a7ad40e9566bf2dc0b00a4.exe 3184 9b58be9bb4a7ad40e9566bf2dc0b00a4.exe 3184 9b58be9bb4a7ad40e9566bf2dc0b00a4.exe 3184 9b58be9bb4a7ad40e9566bf2dc0b00a4.exe 3184 9b58be9bb4a7ad40e9566bf2dc0b00a4.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3184 wrote to memory of 3344 3184 9b58be9bb4a7ad40e9566bf2dc0b00a4.exe 56 PID 3184 wrote to memory of 3344 3184 9b58be9bb4a7ad40e9566bf2dc0b00a4.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3344
-
C:\Users\Admin\AppData\Local\Temp\9b58be9bb4a7ad40e9566bf2dc0b00a4.exe"C:\Users\Admin\AppData\Local\Temp\9b58be9bb4a7ad40e9566bf2dc0b00a4.exe"2⤵
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3184
-