Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
90s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2024, 22:49
Static task
static1
Behavioral task
behavioral1
Sample
c70c5e935d65feca98f77cc2fc392e28.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
c70c5e935d65feca98f77cc2fc392e28.exe
Resource
win10v2004-20231215-en
General
-
Target
c70c5e935d65feca98f77cc2fc392e28.exe
-
Size
33KB
-
MD5
c70c5e935d65feca98f77cc2fc392e28
-
SHA1
5cf7dca6b2011590fba81b893686aaeea81a8f37
-
SHA256
f59546a8c41b210af7702fc9f5db9ab19e0e99bbad2e7fb17c26451ddf900689
-
SHA512
576a641bc6fd540a07b265dae11d723acd8c3e565f1d7dcf23f57d71e462acd743be44cbe404bfc8e7c25e8dcd4fed8248c5c93c3eb5522d85c592ac4588caa2
-
SSDEEP
768:xPH4rKS4GDkQBZ3ImWlTtEIRlJ+qFZ2bSgJzANqM3wJJiT:xf4exGDkeZ4mOoSgJEAJJM
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4748 wrote to memory of 3784 4748 c70c5e935d65feca98f77cc2fc392e28.exe 85 PID 4748 wrote to memory of 3784 4748 c70c5e935d65feca98f77cc2fc392e28.exe 85 PID 4748 wrote to memory of 3784 4748 c70c5e935d65feca98f77cc2fc392e28.exe 85 PID 3784 wrote to memory of 2768 3784 cmd.exe 87 PID 3784 wrote to memory of 2768 3784 cmd.exe 87 PID 3784 wrote to memory of 2768 3784 cmd.exe 87 PID 2768 wrote to memory of 3468 2768 cmd.exe 89 PID 2768 wrote to memory of 3468 2768 cmd.exe 89 PID 2768 wrote to memory of 3468 2768 cmd.exe 89 PID 3468 wrote to memory of 4596 3468 net.exe 90 PID 3468 wrote to memory of 4596 3468 net.exe 90 PID 3468 wrote to memory of 4596 3468 net.exe 90 PID 2768 wrote to memory of 1632 2768 cmd.exe 91 PID 2768 wrote to memory of 1632 2768 cmd.exe 91 PID 2768 wrote to memory of 1632 2768 cmd.exe 91 PID 2768 wrote to memory of 5028 2768 cmd.exe 99 PID 2768 wrote to memory of 5028 2768 cmd.exe 99 PID 2768 wrote to memory of 5028 2768 cmd.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\c70c5e935d65feca98f77cc2fc392e28.exe"C:\Users\Admin\AppData\Local\Temp\c70c5e935d65feca98f77cc2fc392e28.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\dt.bat2⤵
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K c:\windows\temp\r.bat3⤵
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\SysWOW64\net.exenet stop sharedaccess4⤵
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess5⤵PID:4596
-
-
-
C:\Windows\SysWOW64\ftp.exeftp -s:c:\windows\temp\f.txt4⤵PID:1632
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K c:\windows\temp\c.bat4⤵PID:5028
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57d0eb762b413b74951aeaf9f827abd27
SHA1d74286cbc059b13be3435b794a1ffcc36086d5b3
SHA256856eee0ff6b8b730bd499fcb6547da86b23941222fc04507170ea4775845ba6c
SHA512d7706275e525ee30b38f938c72a4c985054bfe7bd083184d336a4aa1bc4df88d85c341ec1448bac28840e460e2c5619d89aaca8e616358efee2b5f7b4b431433
-
Filesize
35B
MD557825840dd74a802acbefce3d055ede5
SHA16cdf5e84e7f25a2dd7ca8197c46af9f8f600f4e8
SHA2566da483818b7a32e2d9fab191c069a9a04c15d22124969345439edbd6e20b70f4
SHA512a7c46527e6f2c24136351effc7ee0acce1c7b31f67d6b673b6547a31c97f4e988f8b8ab60e40ad5b6d94a2d9df0cef964800a4fb380a41d1ce9b89de47a9cf1a
-
Filesize
79B
MD51302f01cdcbb0f9c80b6f3dfbd242e47
SHA15dc9b4a95020de2bc0bfa17829da6d44c9b6c1b8
SHA256d0b46dd67ee171c1e1b729925f6113639f1d9e9e352f1661b90109c72818589c
SHA5120b3ab58fab71c4da1ef3146d3d66536c710204f997cddcefcfc45dab46e231957eeb92f5b4f1f7d6755a948cb3d41c9acf9691b03ccd25c27e3b708a6a78933d
-
Filesize
219B
MD5a124d413f23742f55bff38537701ecd9
SHA1d0edbd0a8b61ec274f9ac420f1059f8710619da2
SHA256ba40e6953acd601d2132d2202e64c1482f497631ed140bb33b05477f05c85139
SHA512a1d5c8a49ad362f34fb52b93b799711a59742d7f828beddb82ce31f99e305ea9aa4b5b39b73c766fd41079962ad9f9bbe68eca4834e6db68b5dac907862c4773