Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/03/2024, 13:59

General

  • Target

    b24d204772ac32d11a09fa611078a1b4.exe

  • Size

    10KB

  • MD5

    b24d204772ac32d11a09fa611078a1b4

  • SHA1

    d1037bacf78a1553060a3fccf9a366552bba95ee

  • SHA256

    1b3ff3186a922c56d2878b848eae40037a754882705c2af4b33e851cf26d7859

  • SHA512

    633c488a871fcd059fbe656980cf142fa32414c101db4b86655d2557583e5c2c721d8532776c41791c9370d8914773eee9c791f6b1b16b2637a75bc5c40d904d

  • SSDEEP

    192:bMxYI3Z07C9Y4Mgkd92/O7lXsZnH1KYzWTpfuv+0b4fwGlAdRpXbxXMb+:4xLJ07bHo/GknH1KYaAv+02lIW+

Score
8/10

Malware Config

Signatures

  • Modifies AppInit DLL entries 2 TTPs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 3 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b24d204772ac32d11a09fa611078a1b4.exe
    "C:\Users\Admin\AppData\Local\Temp\b24d204772ac32d11a09fa611078a1b4.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:2632
    • C:\Windows\SysWOW64\mduaeyk.exe
      C:\Windows\system32\mduaeyk.exe ˜‰
      2⤵
      • Executes dropped EXE
      PID:1760
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\b24d204772ac32d11a09fa611078a1b4.exe.bat
      2⤵
        PID:976

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\b24d204772ac32d11a09fa611078a1b4.exe.bat

      Filesize

      182B

      MD5

      471f2c1ffcb997493e64179948ca43ab

      SHA1

      10b484c6f76a430ca133dc51b21891a303b3d808

      SHA256

      e52d758998118a279a07385b2cf5b5793a1335308eb6c6eb5deaecf248bf4e49

      SHA512

      2419fe56232ad920124849d468545899f759a25873810a299a5da2e15976dc92bf485f1ffbf9c5fc1536fcf4a1b01c6495c15d0789b64332be1a2491c1da1458

    • C:\Windows\SysWOW64\mduaeyk.exe

      Filesize

      10KB

      MD5

      b24d204772ac32d11a09fa611078a1b4

      SHA1

      d1037bacf78a1553060a3fccf9a366552bba95ee

      SHA256

      1b3ff3186a922c56d2878b848eae40037a754882705c2af4b33e851cf26d7859

      SHA512

      633c488a871fcd059fbe656980cf142fa32414c101db4b86655d2557583e5c2c721d8532776c41791c9370d8914773eee9c791f6b1b16b2637a75bc5c40d904d

    • memory/1760-10-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB

    • memory/2632-0-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB

    • memory/2632-8-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB