Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19/03/2024, 19:30
Static task
static1
Behavioral task
behavioral1
Sample
d6efeba412758aba4e024940e2a595db.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d6efeba412758aba4e024940e2a595db.exe
Resource
win10v2004-20240226-en
General
-
Target
d6efeba412758aba4e024940e2a595db.exe
-
Size
100KB
-
MD5
d6efeba412758aba4e024940e2a595db
-
SHA1
2e88a7747ed3566a28d5efa84085fb3249dd39f8
-
SHA256
3aed26d1efa8acde0ec9e9535e5c2510a9e388f5c0847aa33614c4a76a59c2d4
-
SHA512
da50a472e2583b0e701b22ba6ca6b653e0243a31b0d115172c35a7740414f84a746fd9488e248596c2c988e2a80f069d1ac7df1f2bdca83ad4f35c09267720de
-
SSDEEP
3072:tGu99lfzqIbXWm+w0JW5lFy1tqUuBI0F5Wggi:t/cuoH1tXEFX
Malware Config
Signatures
-
resource yara_rule behavioral2/files/0x0009000000023231-4.dat aspack_v212_v242 -
Executes dropped EXE 1 IoCs
pid Process 2612 server.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d6efeba412758aba4e024940e2a595db.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4712 wrote to memory of 2612 4712 d6efeba412758aba4e024940e2a595db.exe 87 PID 4712 wrote to memory of 2612 4712 d6efeba412758aba4e024940e2a595db.exe 87 PID 4712 wrote to memory of 2612 4712 d6efeba412758aba4e024940e2a595db.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\d6efeba412758aba4e024940e2a595db.exe"C:\Users\Admin\AppData\Local\Temp\d6efeba412758aba4e024940e2a595db.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exe2⤵
- Executes dropped EXE
PID:2612
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD5215e3a34a7385b66d0e905503d41a3de
SHA11b7ade5e02615707e28c01ba80c4126243135739
SHA256e6a27174edacf3f3ccb68cc9d015ed684e7a5cc17af310c5650b72eae07de89b
SHA512c50f969a62045e65c086ad580ff9b136861d58ae83ffdca8a5c8eedb3cd174d86428d96e2d5a45a9f00827779a0b3cbaabdfce77af7f59f625bc56a83e41339d