Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
155s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10/03/2024, 15:49
Static task
static1
Behavioral task
behavioral1
Sample
beff20e7865a5316ebc5c38656ab1d0d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
beff20e7865a5316ebc5c38656ab1d0d.exe
Resource
win10v2004-20240226-en
General
-
Target
beff20e7865a5316ebc5c38656ab1d0d.exe
-
Size
636KB
-
MD5
beff20e7865a5316ebc5c38656ab1d0d
-
SHA1
0deb7eb0234c6e8248dfa2f0f0bd277cb30eda95
-
SHA256
bd94e02ef57b48630052735deaf106ceb9cc46210c00861089edcc215f5922b2
-
SHA512
cd3149f617d0b591f1a59d1e29e7d6bbd10511123b703ae15e7a5d439283d7ee4ea6e34285665aeaf1e5bf8d89e6f9062e86b517ce42c9b2de057219220bb59b
-
SSDEEP
12288:Qq9R/qQ/rf/yzNA3zbhLh7H1zeU1c2obY7CwbweS2vprIe:19dqQjf/yBA31l1zeWocOlGrIe
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3996 4.exe 3660 Hacker.com.cn.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" beff20e7865a5316ebc5c38656ab1d0d.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Hacker.com.cn.exe 4.exe File opened for modification C:\Windows\Hacker.com.cn.exe 4.exe File created C:\Windows\uninstal.bat 4.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3996 4.exe Token: SeDebugPrivilege 3660 Hacker.com.cn.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3660 Hacker.com.cn.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4012 wrote to memory of 3996 4012 beff20e7865a5316ebc5c38656ab1d0d.exe 88 PID 4012 wrote to memory of 3996 4012 beff20e7865a5316ebc5c38656ab1d0d.exe 88 PID 4012 wrote to memory of 3996 4012 beff20e7865a5316ebc5c38656ab1d0d.exe 88 PID 3660 wrote to memory of 4968 3660 Hacker.com.cn.exe 92 PID 3660 wrote to memory of 4968 3660 Hacker.com.cn.exe 92 PID 3996 wrote to memory of 4668 3996 4.exe 94 PID 3996 wrote to memory of 4668 3996 4.exe 94 PID 3996 wrote to memory of 4668 3996 4.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\beff20e7865a5316ebc5c38656ab1d0d.exe"C:\Users\Admin\AppData\Local\Temp\beff20e7865a5316ebc5c38656ab1d0d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\uninstal.bat3⤵PID:4668
-
-
-
C:\Windows\Hacker.com.cn.exeC:\Windows\Hacker.com.cn.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:4968
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
787KB
MD54fe559e36f4cbabb80dfa5e1cff23758
SHA1b05179a294b010bbc7d010ece77e3eb2779e5f79
SHA25611fdb8df4544147de8d816e4cac41c5bfa8c17fa09289a7be4e96e0b4e518010
SHA512d7906a6ce071ccf15789e77e9ca3ccdceea0b4dd632de78c5eb492b015c4d1ad0d21e949531019c3fd7244110241dca8f43b5142e9c06a8b96f083603b4ae851
-
Filesize
150B
MD55edd682a8b1f2bf873300774f954ab03
SHA12cca4e743d02dbccf31b784ea26a60c03dcc9637
SHA256a34c51ec5d2ac66ef75719e7dee61b6e89e74d054712438da2585ec92ce0865a
SHA512916f0e846a38f63aae996e2a3957fa24fed3bcaa6add68c529e3cc0aa063dca49b98d42c92317bfc2f43d745c492e1e1e6f5db0c986b9682f4b9b0cf0afd7bd2