Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
23/02/2024, 01:15 UTC
Static task
static1
Behavioral task
behavioral1
Sample
262cd9fb206dcc24ca299aca5d73e2e7.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
262cd9fb206dcc24ca299aca5d73e2e7.exe
Resource
win10v2004-20240221-en
General
-
Target
262cd9fb206dcc24ca299aca5d73e2e7.exe
-
Size
426KB
-
MD5
262cd9fb206dcc24ca299aca5d73e2e7
-
SHA1
f038008a1e2ab293b82ddb39315442d44bc07cb8
-
SHA256
cea71996a0b6d827728465345d79c4c9cdffd6656cc99e9e17436a3fe3ee3403
-
SHA512
d111c56fc710a99fdfdb64de1de2d86787bb68f0fadd95f378e426e6aa052d373848946b185cbffa5ff80705baaec39ed0941c5f654769f564a2754ee6c58a47
-
SSDEEP
12288:2plrVbDdQaqdS/ofraFErH8uB2Wm0SXsNr5FU:SxRQ+Fucuvm0as
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1172 verify.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\code\verify.exe 262cd9fb206dcc24ca299aca5d73e2e7.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2432 262cd9fb206dcc24ca299aca5d73e2e7.exe 2432 262cd9fb206dcc24ca299aca5d73e2e7.exe 2432 262cd9fb206dcc24ca299aca5d73e2e7.exe 2432 262cd9fb206dcc24ca299aca5d73e2e7.exe 1172 verify.exe 1172 verify.exe 1172 verify.exe 1172 verify.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2432 wrote to memory of 1172 2432 262cd9fb206dcc24ca299aca5d73e2e7.exe 88 PID 2432 wrote to memory of 1172 2432 262cd9fb206dcc24ca299aca5d73e2e7.exe 88 PID 2432 wrote to memory of 1172 2432 262cd9fb206dcc24ca299aca5d73e2e7.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\262cd9fb206dcc24ca299aca5d73e2e7.exe"C:\Users\Admin\AppData\Local\Temp\262cd9fb206dcc24ca299aca5d73e2e7.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Program Files\code\verify.exe"C:\Program Files\code\verify.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1172
-
Network
-
Remote address:8.8.8.8:53Request134.32.126.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request9.228.82.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request240.221.184.93.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request57.169.31.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request41.110.16.96.in-addr.arpaIN PTRResponse41.110.16.96.in-addr.arpaIN PTRa96-16-110-41deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request157.123.68.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request198.187.3.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request134.71.91.104.in-addr.arpaIN PTRResponse134.71.91.104.in-addr.arpaIN PTRa104-91-71-134deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request11.227.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request195.201.50.20.in-addr.arpaIN PTRResponse
-
72 B 158 B 1 1
DNS Request
134.32.126.40.in-addr.arpa
-
70 B 156 B 1 1
DNS Request
9.228.82.20.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
240.221.184.93.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
57.169.31.20.in-addr.arpa
-
71 B 135 B 1 1
DNS Request
41.110.16.96.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
157.123.68.40.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
198.187.3.20.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
134.71.91.104.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
11.227.111.52.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
195.201.50.20.in-addr.arpa
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
426KB
MD546c25ea538ad4deac5c2c3e691edbca9
SHA1fdaa3e0a8d8852f618d87a572f6eef44a513c2cc
SHA256b7176e4f24ec371d6da7c2d53f6bfa77d152cfc651a20f5a2f9c9ba748e021b2
SHA51203e00ee5927ef87538b90c5f1e567b9a0e7e1edee6aaf5e02ec59a7241b7627f6f9a346868486fc3230964a85829acbb1d21d57ec66cf53d4c690d8caa0e4470