Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
25/02/2024, 14:45
Static task
static1
Behavioral task
behavioral1
Sample
a40d521687543ade199a9960bae3b821.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a40d521687543ade199a9960bae3b821.exe
Resource
win10v2004-20240221-en
General
-
Target
a40d521687543ade199a9960bae3b821.exe
-
Size
34KB
-
MD5
a40d521687543ade199a9960bae3b821
-
SHA1
cb548e67b03204403da4bf82cf3c2dc58df35302
-
SHA256
19bbbe3c06aa6a6940fbf4c971193eae81367a85695f029219a017f02af27534
-
SHA512
d242ab1b09141e662ed9595c73e5658298d3e969254429a19b61dbfd7bcf61876fb7677d5649fdfffd3cb2dcbc74789e76d8b95b88aec8d5ba4d086fe66bdd96
-
SSDEEP
768:UbWMezBoePQ2nl+sftNZZ4DIjpD1ywVneyMoXmFNT3KW9Gg:L/Boy+sfthdjpowVJMoXmFR6W9x
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\6794 = "C:\\PROGRA~3\\LOCALS~1\\Temp\\msjode.exe" svchost.exe -
Deletes itself 1 IoCs
pid Process 1616 svchost.exe -
Loads dropped DLL 1 IoCs
pid Process 1460 a40d521687543ade199a9960bae3b821.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum a40d521687543ade199a9960bae3b821.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 a40d521687543ade199a9960bae3b821.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1460 set thread context of 5012 1460 a40d521687543ade199a9960bae3b821.exe 93 PID 5012 set thread context of 1464 5012 a40d521687543ade199a9960bae3b821.exe 94 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\PROGRA~3\LOCALS~1\Temp\msjode.exe svchost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1464 a40d521687543ade199a9960bae3b821.exe 1464 a40d521687543ade199a9960bae3b821.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1464 a40d521687543ade199a9960bae3b821.exe 1464 a40d521687543ade199a9960bae3b821.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1460 wrote to memory of 5012 1460 a40d521687543ade199a9960bae3b821.exe 93 PID 1460 wrote to memory of 5012 1460 a40d521687543ade199a9960bae3b821.exe 93 PID 1460 wrote to memory of 5012 1460 a40d521687543ade199a9960bae3b821.exe 93 PID 1460 wrote to memory of 5012 1460 a40d521687543ade199a9960bae3b821.exe 93 PID 1460 wrote to memory of 5012 1460 a40d521687543ade199a9960bae3b821.exe 93 PID 1460 wrote to memory of 5012 1460 a40d521687543ade199a9960bae3b821.exe 93 PID 1460 wrote to memory of 5012 1460 a40d521687543ade199a9960bae3b821.exe 93 PID 5012 wrote to memory of 1464 5012 a40d521687543ade199a9960bae3b821.exe 94 PID 5012 wrote to memory of 1464 5012 a40d521687543ade199a9960bae3b821.exe 94 PID 5012 wrote to memory of 1464 5012 a40d521687543ade199a9960bae3b821.exe 94 PID 5012 wrote to memory of 1464 5012 a40d521687543ade199a9960bae3b821.exe 94 PID 5012 wrote to memory of 1464 5012 a40d521687543ade199a9960bae3b821.exe 94 PID 5012 wrote to memory of 1464 5012 a40d521687543ade199a9960bae3b821.exe 94 PID 1464 wrote to memory of 1616 1464 a40d521687543ade199a9960bae3b821.exe 95 PID 1464 wrote to memory of 1616 1464 a40d521687543ade199a9960bae3b821.exe 95 PID 1464 wrote to memory of 1616 1464 a40d521687543ade199a9960bae3b821.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\a40d521687543ade199a9960bae3b821.exe"C:\Users\Admin\AppData\Local\Temp\a40d521687543ade199a9960bae3b821.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Users\Admin\AppData\Local\Temp\a40d521687543ade199a9960bae3b821.exe"C:\Users\Admin\AppData\Local\Temp\a40d521687543ade199a9960bae3b821.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Users\Admin\AppData\Local\Temp\a40d521687543ade199a9960bae3b821.exe"C:\Users\Admin\AppData\Local\Temp\a40d521687543ade199a9960bae3b821.exe"3⤵
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe4⤵
- Adds policy Run key to start application
- Deletes itself
- Drops file in Program Files directory
PID:1616
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD59dae05249eb9020641aed5ad5270ad85
SHA178d400b62219898420a53af2d20f93aa2be2c31a
SHA2563cceb58085b04a6ed5054dd2bdbbcc35b9e0e7c50324702a57c2f121da4805fa
SHA512b5acc0c9a65144dca5af0ec43d776921903b3f8147fb023cd2e2e438ea580148d40a021421516088c6a21f09dcf66772346e41e48625c02e8174092a9d7f3156