Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/03/2024, 17:03

General

  • Target

    bf245e182f190ac1038b2211880624e1.exe

  • Size

    209KB

  • MD5

    bf245e182f190ac1038b2211880624e1

  • SHA1

    9fe97778fee4d812ea661d3cb0c00552b56f83bb

  • SHA256

    4c763635476d0ac2add1904173e286ed115ec3157e9749eca5d8dbf148b1babd

  • SHA512

    4ca2efe4ebf39f31d4c4dd31f9dd435560d5cbdf9ca8fddf5ec3c9c71a93c712afd2a4bdaa5ac6d3ce5989fae543761296364aacf8691633a14ccaedbc7e3eb9

  • SSDEEP

    6144:7l0n6au0M3RGRBvBi05Nb06mpCsUiXIculBK:Cn6au09RhB1jbr+pYcY

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bf245e182f190ac1038b2211880624e1.exe
    "C:\Users\Admin\AppData\Local\Temp\bf245e182f190ac1038b2211880624e1.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1216
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\5525.tmp\vir.bat""
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4584
      • C:\Users\Admin\AppData\Local\Temp\u.dll
        u.dll -bat vir.bat -save bf245e182f190ac1038b2211880624e1.exe.com -include s.dll -overwrite -nodelete
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4408
        • C:\Users\Admin\AppData\Local\Temp\561F.tmp\mpress.exe
          "C:\Users\Admin\AppData\Local\Temp\561F.tmp\mpress.exe" "C:\Users\Admin\AppData\Local\Temp\exe5620.tmp"
          4⤵
          • Executes dropped EXE
          PID:3088
      • C:\Windows\SysWOW64\calc.exe
        CALC.EXE
        3⤵
        • Modifies registry class
        PID:412
      • C:\Windows\SysWOW64\calc.exe
        CALC.EXE
        3⤵
        • Modifies registry class
        PID:5100
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:4952
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2164

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\5525.tmp\vir.bat

    Filesize

    1KB

    MD5

    0e127518351c92ce6592eab985a815b4

    SHA1

    8f9b834774809ead370d0fd00f3bf85f4382f853

    SHA256

    705a8a351c7cde5479bb5c10aa9504fd636879722c8dd196f8a0cc0762fa0486

    SHA512

    44ab09994bb512de0df05f93081ed3a994e628582ebadcb189fc3c5cb8b43323d0a24822314006e64ea0b9dc24db40f9057f7299134c7ef1463ddeeaaec58cd3

  • C:\Users\Admin\AppData\Local\Temp\561F.tmp\mpress.exe

    Filesize

    100KB

    MD5

    e42b81b9636152c78ba480c1c47d3c7f

    SHA1

    66a2fca3925428ee91ad9df5b76b90b34d28e0f8

    SHA256

    7c24c72439880e502be51da5d991b9b56a1af242b4eef4737f0f43b4a87546d2

    SHA512

    4b2986106325c5c3fe11ab460f646d4740eb85252aa191f2b84e29901fac146d7a82e31c72d39c38a70277f78278621ee506d9da2681f5019cd64c7df85cff6e

  • C:\Users\Admin\AppData\Local\Temp\exe5620.tmp

    Filesize

    41KB

    MD5

    7aa367dca7be65e07b16bd69f06263e3

    SHA1

    d447739251408f8e8490a9d307927bfbe41737ce

    SHA256

    738bf50547320b0683af727ad6d430f2e7b83c846fe24f91527b7ee263bfa076

    SHA512

    d7884589d7d12a628c9e07b77b3b793fa91f67fe13563e7b072ca864e053e6b7d711852e30ae1c877576b8ad47f67d2826e8ee711e6b65a329baa57492fe31b3

  • C:\Users\Admin\AppData\Local\Temp\mpr5776.tmp

    Filesize

    24KB

    MD5

    7cda353434725a4a3712954fd3ded290

    SHA1

    d8348e79d6bcee527743b126026367d700ddb436

    SHA256

    7e781837fa89a8ead0a14c14a7f2125a89bb7b33d2ccc358f6b8ad22924b5e86

    SHA512

    4ac257fe8e0772adc8aa1a2626153c473554c341c025959dd994100c43e2cec274e8a532e0c1b5c0ecdf463733d25a63767b995b731ce272b1c7a3ad0820b95d

  • C:\Users\Admin\AppData\Local\Temp\s.dll

    Filesize

    700KB

    MD5

    3c9568b0d86a865f9f73d9c0967cfdad

    SHA1

    3270df3e0e600f4df2c3cbc384837693a8a3a83e

    SHA256

    c7b97a001b39e17382e929aad924555f3d21886b86aed38cffd660490801d1d6

    SHA512

    bd423d1d57823b1bf6db42aeec199aa93178a9317ead85b42b60e091aaf4f73ce721bc07fda4750e112c4dccb9d87e21d5793965da9d6e92b0c5bed92c26876f

  • C:\Users\Admin\AppData\Local\Temp\vir.bat

    Filesize

    1KB

    MD5

    d0f82f8a4d49fa0724bb3c77e877c8c8

    SHA1

    64f4374bacad365c2fe64f7ad7ad80727a681d10

    SHA256

    868222539480c7e1b496b1911abca38d825182e8818d09a4317fcb00f2e81f04

    SHA512

    7d655370108729fc26ab31e475b00004198b1a98c708652889e7d7a66d6bb198fd291afa1729178dbb9048de3f4cea2ca291824bef9b210cbeff1aa62af7e171

  • memory/1216-0-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/1216-1-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/1216-71-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/3088-55-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/3088-63-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB