Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/03/2024, 01:33
Static task
static1
Behavioral task
behavioral1
Sample
bf7e052ab31d773942b1ded15520c7f3.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bf7e052ab31d773942b1ded15520c7f3.exe
Resource
win10v2004-20240226-en
General
-
Target
bf7e052ab31d773942b1ded15520c7f3.exe
-
Size
24KB
-
MD5
bf7e052ab31d773942b1ded15520c7f3
-
SHA1
ba2f288a9bc50f16d25421a0dcf629758ca52a25
-
SHA256
e77160fbf8a1b25edfb2d235127162f0de19fd30af4c136d220fe674b002b544
-
SHA512
d24cf454a5dd878249e2d04d6df6852d1399328cb48ba7b74410d5acc155b65de6599c295322a38e816ef0bbbf0065021374315ce5e8b7c5d1ff17f58449a34f
-
SSDEEP
384:ZLIR145WA+rS/EsMmRBtKyu9kw+CBY4TmbLJNcdrnYh8TPzdfeOKmE/AhWcu:Jh9Z/v5BLTOqlNsrnuCPzFeOK1Awc
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\explorer\run bf7e052ab31d773942b1ded15520c7f3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\rare = "C:\\Users\\Admin\\AppData\\Local\\Temp\\bf7e052ab31d773942b1ded15520c7f3.exe" bf7e052ab31d773942b1ded15520c7f3.exe -
Executes dropped EXE 1 IoCs
pid Process 440 imsmn.exe -
resource yara_rule behavioral2/files/0x000700000001e59e-2.dat upx behavioral2/memory/440-3-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/440-5-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4856 bf7e052ab31d773942b1ded15520c7f3.exe 4856 bf7e052ab31d773942b1ded15520c7f3.exe 440 imsmn.exe 440 imsmn.exe 440 imsmn.exe 4856 bf7e052ab31d773942b1ded15520c7f3.exe 440 imsmn.exe 4856 bf7e052ab31d773942b1ded15520c7f3.exe 440 imsmn.exe 4856 bf7e052ab31d773942b1ded15520c7f3.exe 440 imsmn.exe 4856 bf7e052ab31d773942b1ded15520c7f3.exe 440 imsmn.exe 440 imsmn.exe 4856 bf7e052ab31d773942b1ded15520c7f3.exe 4856 bf7e052ab31d773942b1ded15520c7f3.exe 440 imsmn.exe 4856 bf7e052ab31d773942b1ded15520c7f3.exe 440 imsmn.exe 4856 bf7e052ab31d773942b1ded15520c7f3.exe 4856 bf7e052ab31d773942b1ded15520c7f3.exe 4856 bf7e052ab31d773942b1ded15520c7f3.exe 440 imsmn.exe 440 imsmn.exe 4856 bf7e052ab31d773942b1ded15520c7f3.exe 4856 bf7e052ab31d773942b1ded15520c7f3.exe 440 imsmn.exe 440 imsmn.exe 4856 bf7e052ab31d773942b1ded15520c7f3.exe 4856 bf7e052ab31d773942b1ded15520c7f3.exe 440 imsmn.exe 440 imsmn.exe 4856 bf7e052ab31d773942b1ded15520c7f3.exe 4856 bf7e052ab31d773942b1ded15520c7f3.exe 440 imsmn.exe 440 imsmn.exe 4856 bf7e052ab31d773942b1ded15520c7f3.exe 4856 bf7e052ab31d773942b1ded15520c7f3.exe 440 imsmn.exe 440 imsmn.exe 4856 bf7e052ab31d773942b1ded15520c7f3.exe 4856 bf7e052ab31d773942b1ded15520c7f3.exe 440 imsmn.exe 440 imsmn.exe 4856 bf7e052ab31d773942b1ded15520c7f3.exe 4856 bf7e052ab31d773942b1ded15520c7f3.exe 440 imsmn.exe 440 imsmn.exe 4856 bf7e052ab31d773942b1ded15520c7f3.exe 4856 bf7e052ab31d773942b1ded15520c7f3.exe 440 imsmn.exe 440 imsmn.exe 4856 bf7e052ab31d773942b1ded15520c7f3.exe 4856 bf7e052ab31d773942b1ded15520c7f3.exe 440 imsmn.exe 440 imsmn.exe 4856 bf7e052ab31d773942b1ded15520c7f3.exe 4856 bf7e052ab31d773942b1ded15520c7f3.exe 440 imsmn.exe 440 imsmn.exe 4856 bf7e052ab31d773942b1ded15520c7f3.exe 4856 bf7e052ab31d773942b1ded15520c7f3.exe 440 imsmn.exe 440 imsmn.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4856 wrote to memory of 440 4856 bf7e052ab31d773942b1ded15520c7f3.exe 89 PID 4856 wrote to memory of 440 4856 bf7e052ab31d773942b1ded15520c7f3.exe 89 PID 4856 wrote to memory of 440 4856 bf7e052ab31d773942b1ded15520c7f3.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf7e052ab31d773942b1ded15520c7f3.exe"C:\Users\Admin\AppData\Local\Temp\bf7e052ab31d773942b1ded15520c7f3.exe"1⤵
- Adds policy Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Users\Admin\AppData\Local\Temp\imsmn.exeC:\Users\Admin\AppData\Local\Temp\imsmn.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:440
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5d03b25f1662a26d6922e6d24828cd509
SHA17d3c8e5c4ade92e6d692a63a2fc8b56089dc6193
SHA256f34dc3e7292f569c454bc492c9bf3e19c3cb4650dc2397b6437367facb2e39dd
SHA51269cff54d7f0f48a28a0f338d47ec6a599d83968972983a778577bedd7d830a831ad6adb29ad000c63d94d9ae625e74555bfb45c1d257aceb3d44be1814c82d8d