Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19/03/2024, 23:39
Behavioral task
behavioral1
Sample
d75e46c5b5ea4ea3a2eb2ef69571c777.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d75e46c5b5ea4ea3a2eb2ef69571c777.exe
Resource
win10v2004-20240226-en
General
-
Target
d75e46c5b5ea4ea3a2eb2ef69571c777.exe
-
Size
13KB
-
MD5
d75e46c5b5ea4ea3a2eb2ef69571c777
-
SHA1
9341e1106bc8db36e26eb6e4f11de280ba55062d
-
SHA256
9c4677e9f3ec12b05184ff8b3dcf5d1591579bc940d64191d9e1bda6a5de2a26
-
SHA512
cd691470cce7761869d26df9b95bdeb116fe9bf4475a9c91e754e2303f9f1539f047b0ec43d30cd5c55c6cf52b2f30066c2a94faedb3e6923bb024915f182629
-
SSDEEP
384:BGC7b7P4tezbG3ShKSJ2di7nvm/gPhnQCD/:V7b7P433QYdImIJQC
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 624 delnicek.exe -
resource yara_rule behavioral2/memory/3768-0-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/files/0x000a000000023176-4.dat upx behavioral2/memory/624-6-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/3768-7-0x0000000000400000-0x0000000000410000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\delnice.dll d75e46c5b5ea4ea3a2eb2ef69571c777.exe File created C:\Windows\SysWOW64\delnicek.exe d75e46c5b5ea4ea3a2eb2ef69571c777.exe File opened for modification C:\Windows\SysWOW64\delnicek.exe d75e46c5b5ea4ea3a2eb2ef69571c777.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3768 wrote to memory of 624 3768 d75e46c5b5ea4ea3a2eb2ef69571c777.exe 88 PID 3768 wrote to memory of 624 3768 d75e46c5b5ea4ea3a2eb2ef69571c777.exe 88 PID 3768 wrote to memory of 624 3768 d75e46c5b5ea4ea3a2eb2ef69571c777.exe 88 PID 3768 wrote to memory of 5772 3768 d75e46c5b5ea4ea3a2eb2ef69571c777.exe 102 PID 3768 wrote to memory of 5772 3768 d75e46c5b5ea4ea3a2eb2ef69571c777.exe 102 PID 3768 wrote to memory of 5772 3768 d75e46c5b5ea4ea3a2eb2ef69571c777.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\d75e46c5b5ea4ea3a2eb2ef69571c777.exe"C:\Users\Admin\AppData\Local\Temp\d75e46c5b5ea4ea3a2eb2ef69571c777.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3768 -
C:\Windows\SysWOW64\delnicek.exeC:\Windows\system32\delnicek.exe ˜‰2⤵
- Executes dropped EXE
PID:624
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\d75e46c5b5ea4ea3a2eb2ef69571c777.exe.bat2⤵PID:5772
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
182B
MD56d184225ef367c42adff82b98984366f
SHA1567e5e14edbc3193b8dd23fa3e35cdf3608537bd
SHA2568f5f642a625bf192038c0e4aa03d8bbee87c85bf5b69f370a862a5c3a71dc8df
SHA512a611a39823095659dbced78b31b10022d3ccc03f59dfffb8f505543f6fe219597eef1bca3419a19b3909abef21d449a4a77d6bc4b65b8e663b83345f30872a0a
-
Filesize
13KB
MD5d75e46c5b5ea4ea3a2eb2ef69571c777
SHA19341e1106bc8db36e26eb6e4f11de280ba55062d
SHA2569c4677e9f3ec12b05184ff8b3dcf5d1591579bc940d64191d9e1bda6a5de2a26
SHA512cd691470cce7761869d26df9b95bdeb116fe9bf4475a9c91e754e2303f9f1539f047b0ec43d30cd5c55c6cf52b2f30066c2a94faedb3e6923bb024915f182629