Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
94s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12/03/2024, 22:48
Behavioral task
behavioral1
Sample
8edb7497f0524af271d09084ab8bff442866aff224c32826f2bb33d869f03356.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
8edb7497f0524af271d09084ab8bff442866aff224c32826f2bb33d869f03356.exe
Resource
win10v2004-20231215-en
General
-
Target
8edb7497f0524af271d09084ab8bff442866aff224c32826f2bb33d869f03356.exe
-
Size
377KB
-
MD5
27be19895ccb4c6e74f5835f3a2075f6
-
SHA1
ca8b7cc4741387130059c498c9f751e4dc338d78
-
SHA256
8edb7497f0524af271d09084ab8bff442866aff224c32826f2bb33d869f03356
-
SHA512
89ed259ce4995057bbc935b38201535f19afb5e493593e491868da9c3e168210d338fedb00efb8ec91f25fa6b41c0cb05e9aa2671455ff9379d5b9405f24c047
-
SSDEEP
6144:G72k0YujF59B+SNiT1SRws339pnPJ7ImcvKoSYxTg:0FxujX9B+lAb9ImhoSmTg
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 3 IoCs
resource yara_rule behavioral2/memory/3300-0-0x0000000000400000-0x000000000045F000-memory.dmp UPX behavioral2/memory/4620-6-0x0000000000400000-0x000000000045F000-memory.dmp UPX behavioral2/files/0x00080000000231ca-5.dat UPX -
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 4620 frviiqj.exe -
resource yara_rule behavioral2/memory/3300-0-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral2/memory/4620-6-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral2/files/0x00080000000231ca-5.dat upx -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\frviiqj.exe 8edb7497f0524af271d09084ab8bff442866aff224c32826f2bb33d869f03356.exe File created C:\PROGRA~3\Mozilla\sjqrgse.dll frviiqj.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8edb7497f0524af271d09084ab8bff442866aff224c32826f2bb33d869f03356.exe"C:\Users\Admin\AppData\Local\Temp\8edb7497f0524af271d09084ab8bff442866aff224c32826f2bb33d869f03356.exe"1⤵
- Drops file in Program Files directory
PID:3300
-
C:\PROGRA~3\Mozilla\frviiqj.exeC:\PROGRA~3\Mozilla\frviiqj.exe -myayasb1⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:4620
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
377KB
MD5dac54c00501f04a88060713ff5f52d19
SHA1a8e9ec861ca112a04d7efb95d0b4ea268d7d6bde
SHA2561a1c54731b0ba6e81e1f2df592367f5ef74b426c4902fe75db437f3f0a3aab48
SHA51203500d3ce1bb89bcccc41f1709921354a4173b386206d816c68daaf79e53685ae34bff076a26405386cd5f7ca028dd71c0205d660fcd3ae40e1a8e444ffa4f13