Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2024, 08:05
Static task
static1
Behavioral task
behavioral1
Sample
c5622bb285f1f184c7f35caef783a653.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c5622bb285f1f184c7f35caef783a653.exe
Resource
win10v2004-20240226-en
General
-
Target
c5622bb285f1f184c7f35caef783a653.exe
-
Size
31KB
-
MD5
c5622bb285f1f184c7f35caef783a653
-
SHA1
1cbdac48ca02def130dbb9aa2d9a42c9320d4151
-
SHA256
e608f1e9a06f9ff00378968f616242eb3e09b8d22481c8d99d9ae9bf1d26c0a6
-
SHA512
988e248e8d3bec013f02212fcc1714c1ed3c3b33a41092dea6f9e828815e51a783c8335c5b09e3e5790eafc49657e8bf00bfd8b94960591896641dd284dd194f
-
SSDEEP
768:WKu4EIgI2EDTUtljOomhozhACKf3C0VW+RXu5SEAOXCJsLxcY:n/EETuxOwzKCK/Kue5SEAGOY
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 3932 c5622bb285f1f184c7f35caef783a653.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\jkkIASiJ.dll c5622bb285f1f184c7f35caef783a653.exe File created C:\Windows\SysWOW64\jkkIASiJ.dll c5622bb285f1f184c7f35caef783a653.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3932 c5622bb285f1f184c7f35caef783a653.exe 3932 c5622bb285f1f184c7f35caef783a653.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3932 c5622bb285f1f184c7f35caef783a653.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3932 c5622bb285f1f184c7f35caef783a653.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3932 wrote to memory of 620 3932 c5622bb285f1f184c7f35caef783a653.exe 5 PID 3932 wrote to memory of 2556 3932 c5622bb285f1f184c7f35caef783a653.exe 109 PID 3932 wrote to memory of 2556 3932 c5622bb285f1f184c7f35caef783a653.exe 109 PID 3932 wrote to memory of 2556 3932 c5622bb285f1f184c7f35caef783a653.exe 109 PID 3932 wrote to memory of 4040 3932 c5622bb285f1f184c7f35caef783a653.exe 110 PID 3932 wrote to memory of 4040 3932 c5622bb285f1f184c7f35caef783a653.exe 110 PID 3932 wrote to memory of 4040 3932 c5622bb285f1f184c7f35caef783a653.exe 110
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:620
-
C:\Users\Admin\AppData\Local\Temp\c5622bb285f1f184c7f35caef783a653.exe"C:\Users\Admin\AppData\Local\Temp\c5622bb285f1f184c7f35caef783a653.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe ,a2⤵PID:2556
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\removalfile.bat "C:\Users\Admin\AppData\Local\Temp\c5622bb285f1f184c7f35caef783a653.exe"2⤵PID:4040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4324 --field-trial-handle=2284,i,9807419199535700662,2319175108930815708,262144 --variations-seed-version /prefetch:81⤵PID:4368
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43B
MD59a7ef09167a6f4433681b94351509043
SHA1259b1375ed8e84943ca1d42646bb416325c89e12
SHA256d5739a0510d89da572eb0b0d394d4fb4dd361cd9ee0144b9b31c590df93c3be7
SHA51296b84cd88a0e4b7c1122af3ed6ce5edf0a9a4e9bf79575eadfac16b2c46f1278d57755d29f21d7c6dcb4403be24b7ac7da4837c6cc9c602342a8f2b8e54883df
-
Filesize
24KB
MD56934b0115adb7d5274e636e20a273230
SHA1d413c3cf209080b42b7231eeda22ca1b90c79725
SHA256ab0be01bce1f86ed28d57ea621be3672671837f5c81468052b2ce8bf182104f3
SHA5127c634621ae6f8ffaaad49338ee0bc8817c9c4672388b330b73b60e8db4e2bc117101619ab38a15362472e74001bcccc9ae23b24b6d6434c9a2b4dae333a9c1be