Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/03/2024, 08:36

General

  • Target

    cd99007cbd7e88b6c07d2cfdaaab0bd2.exe

  • Size

    133KB

  • MD5

    cd99007cbd7e88b6c07d2cfdaaab0bd2

  • SHA1

    9ba1c894451a95d61a71ea2ad8bb8da64f02329d

  • SHA256

    0e0944a279a980989c75d3f4d94b90ba00a3e779c140c459541b28ceecf4202a

  • SHA512

    9754e55b149b12d92e531c5ea6fca8f504bbe09dab1e9e5c6740150c41edec3b82bc7155f5cff4e2775c60d25182bfe3e522aeea47a9ce4b2affbb04bfd13af5

  • SSDEEP

    3072:oX/fGaliguHl30+P1p5PeL/Re+D8hOfgm5YmrQ:oXXGSiz50+P/po/ReO8hOfnVQ

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cd99007cbd7e88b6c07d2cfdaaab0bd2.exe
    "C:\Users\Admin\AppData\Local\Temp\cd99007cbd7e88b6c07d2cfdaaab0bd2.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1332
    • C:\Users\Admin\AppData\Local\Temp\cd99007cbd7e88b6c07d2cfdaaab0bd2.exe
      C:\Users\Admin\AppData\Local\Temp\cd99007cbd7e88b6c07d2cfdaaab0bd2.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:2900
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4060 --field-trial-handle=2328,i,5873823382323802923,13134441441264702821,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:4860

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\cd99007cbd7e88b6c07d2cfdaaab0bd2.exe

      Filesize

      133KB

      MD5

      93c3c3a53324d58efdd1a8f6b633cdd4

      SHA1

      f6f19955db9a3ed3bee2f46fd8ca9bddbddc580b

      SHA256

      f66fc03c8bb5d9fa2b77c41a5ed878dc61dc594d930caa16af2992494d535af5

      SHA512

      a75d234da600ba6feb405e8451c74c79b1b69a2d144d0d35c27e9de04aab423b96f8e21a6d5a2ea8d6c26eb2e143c1f21836420a889cbf6f2238b31f388ea69b

    • memory/1332-0-0x0000000000400000-0x0000000000486000-memory.dmp

      Filesize

      536KB

    • memory/1332-1-0x00000000000F0000-0x0000000000111000-memory.dmp

      Filesize

      132KB

    • memory/1332-2-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/1332-14-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/2900-15-0x00000000001A0000-0x00000000001C1000-memory.dmp

      Filesize

      132KB

    • memory/2900-13-0x0000000000400000-0x0000000000486000-memory.dmp

      Filesize

      536KB

    • memory/2900-16-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/2900-30-0x0000000000400000-0x0000000000486000-memory.dmp

      Filesize

      536KB