Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10/03/2024, 13:18
Static task
static1
Behavioral task
behavioral1
Sample
beb4479c7ca079bcfd383c866dabcd97.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
beb4479c7ca079bcfd383c866dabcd97.exe
Resource
win10v2004-20240226-en
General
-
Target
beb4479c7ca079bcfd383c866dabcd97.exe
-
Size
136KB
-
MD5
beb4479c7ca079bcfd383c866dabcd97
-
SHA1
3f936a598933295519e5cca4a1c6f270ea61ec79
-
SHA256
7a75e1ccffbb48b833a6c0568d312282857e397024fcf134870914831e11b21f
-
SHA512
6ee3b17c0321e90b48e1ab935c77f419d7646a47394ecb74d18cb94a45230629e0ea0cb413b97aa52c579c8a70697f514af6662b10df140eeeef2c6ed892505a
-
SSDEEP
3072:Lj51Phc8CVrFRsEOIVC1bPw3l4/VVlW0iqf2Tf4SHSle:Lj5M8CVpRs6C1Dw3WNVlW0iqwf4SHSl
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 820 avp.exe -
Loads dropped DLL 2 IoCs
pid Process 1028 beb4479c7ca079bcfd383c866dabcd97.exe 1028 beb4479c7ca079bcfd383c866dabcd97.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 beb4479c7ca079bcfd383c866dabcd97.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\od3mdi.dll beb4479c7ca079bcfd383c866dabcd97.exe File created C:\Windows\SysWOW64\delplme.bat beb4479c7ca079bcfd383c866dabcd97.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\avp.exe beb4479c7ca079bcfd383c866dabcd97.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 1028 beb4479c7ca079bcfd383c866dabcd97.exe 672 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLoadDriverPrivilege 1028 beb4479c7ca079bcfd383c866dabcd97.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1028 wrote to memory of 3560 1028 beb4479c7ca079bcfd383c866dabcd97.exe 100 PID 1028 wrote to memory of 3560 1028 beb4479c7ca079bcfd383c866dabcd97.exe 100 PID 1028 wrote to memory of 3560 1028 beb4479c7ca079bcfd383c866dabcd97.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\beb4479c7ca079bcfd383c866dabcd97.exe"C:\Users\Admin\AppData\Local\Temp\beb4479c7ca079bcfd383c866dabcd97.exe"1⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c delplme.bat2⤵PID:3560
-
-
C:\Windows\avp.exeC:\Windows\avp.exe1⤵
- Executes dropped EXE
PID:820
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3808 --field-trial-handle=2280,i,716736634476467098,11449718822158202904,262144 --variations-seed-version /prefetch:81⤵PID:2424
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264B
MD5ff0cfc884b10bd269cad65416147445f
SHA1c25074b014db786161c8502a333b1ab1088db6c8
SHA256adf0cda2997ba8739eb5b5205fc56f0072006634a9096f6942e8df22f27f4dd0
SHA512221f90e31cbc739c1c9858cf95346c76d25bbc5dd7cad29dd2146ddc30f72fa6696c3bd5d6e4d872ee21183f1e14317ce07b3e02835e920e36adec181a99e458
-
Filesize
103KB
MD5aadb4ba1cbf92d6f8f232b19d66359ba
SHA1be7c64a9395e8f26b35b3d2061e4a1cfa126f1e2
SHA256bbf8f4242396712cfe980755c7e1640e5a572356ad8e4ce94f22c72504aa3ea1
SHA5124a2e8080e60b27569cc97023617af5b75b2d46a940bd1e4462c3532aa3dfae630c56570faea83da2a7456388b3d75c37bec869f6013e0cfefc840747da43eb83
-
Filesize
18KB
MD5b1772ac0ea52843391e6242b403e4979
SHA150673dfe4a0a7847f3fb37681cf94670b3d2b72f
SHA25602ee17746e5aa2813bc50b3e59f3a86798015d023d0397d4cfe974b317445e8a
SHA51217a3e9ce45b8d2af30e0af28747ea9fd9b72b594bf7c9fb4e09398beeae2eb9e6cd7ecf39f9230aa5e813c1a677783d0f9f88f9235ac7039db66538c2e1d10fb