Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19/03/2024, 23:27
Static task
static1
Behavioral task
behavioral1
Sample
d757c8f286baaf93380e560c986b6222.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d757c8f286baaf93380e560c986b6222.exe
Resource
win10v2004-20240226-en
General
-
Target
d757c8f286baaf93380e560c986b6222.exe
-
Size
614KB
-
MD5
d757c8f286baaf93380e560c986b6222
-
SHA1
8c6bf2a37004c382c18e6b23ab0b8e5be1569e5d
-
SHA256
830bf8ebb7a9f6b44f657836c6dad8d1cebab16350f402dbf599d4f38e019ed0
-
SHA512
1f69ecc47e5dad5788db34e2def9a4991345a4fac2ef322cd80451ead1f65e6d5af00785f56663055796c3bb7b935f5d74895b31a3075adc1cffb1cb9f666700
-
SSDEEP
12288:P5v8WAA12+eawYcPxrg+v8EUVhF3Z4mxxlSWUcOeTHfkzz+:Px0tzY8xD1AQmXzUcrTHcf+
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2340 Hacker.com.cn.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Hacker.com.cn.exe d757c8f286baaf93380e560c986b6222.exe File opened for modification C:\Windows\Hacker.com.cn.exe d757c8f286baaf93380e560c986b6222.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ Hacker.com.cn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" Hacker.com.cn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" Hacker.com.cn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" Hacker.com.cn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" Hacker.com.cn.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3896 d757c8f286baaf93380e560c986b6222.exe Token: SeDebugPrivilege 2340 Hacker.com.cn.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2340 Hacker.com.cn.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2340 wrote to memory of 1520 2340 Hacker.com.cn.exe 93 PID 2340 wrote to memory of 1520 2340 Hacker.com.cn.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\d757c8f286baaf93380e560c986b6222.exe"C:\Users\Admin\AppData\Local\Temp\d757c8f286baaf93380e560c986b6222.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:3896
-
C:\Windows\Hacker.com.cn.exeC:\Windows\Hacker.com.cn.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:1520
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
614KB
MD5d757c8f286baaf93380e560c986b6222
SHA18c6bf2a37004c382c18e6b23ab0b8e5be1569e5d
SHA256830bf8ebb7a9f6b44f657836c6dad8d1cebab16350f402dbf599d4f38e019ed0
SHA5121f69ecc47e5dad5788db34e2def9a4991345a4fac2ef322cd80451ead1f65e6d5af00785f56663055796c3bb7b935f5d74895b31a3075adc1cffb1cb9f666700
-
Filesize
305KB
MD51e3d8d3d5fc599f132503d4103e26712
SHA173389541a3f4a619d32352f11a954f9f62676e51
SHA256b5559e803fab65f8b4fdb34befcad789f55df88ea5e37c33a41c64279cc5f182
SHA512b6b3f3584dca3985cfe61bfb66005298a62785ec7a681170354202f19697a94e427932b5c0090e4647fc50c89fd4c363d6f8a583b0a2ceb2866ae09f5e4cbf71