Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19/03/2024, 18:40
Static task
static1
Behavioral task
behavioral1
Sample
d6d645b00bde814fd35edb3c07d72a80.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
d6d645b00bde814fd35edb3c07d72a80.exe
Resource
win10v2004-20240226-en
General
-
Target
d6d645b00bde814fd35edb3c07d72a80.exe
-
Size
125KB
-
MD5
d6d645b00bde814fd35edb3c07d72a80
-
SHA1
764781724b5af6d9f14cf4d0463271ea05358ce8
-
SHA256
e6171ffbc8e0cd50e6136464a37763fd748502030b62519867e4f9e994a83bc4
-
SHA512
227b00b51f90f3f196676fd010c3801062e07b110fd2aeb182e32c0000242dd7672fd4e49242b998706ddec084c13ba66588bcea521f021096eeaf6fb0840a2f
-
SSDEEP
3072:EJgwBIxhn+dz7diTqkGqcZBUPs7dHNnu3lAzyDJkluJfBd8l:EuwWx8fScnUPey1BtB
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2984 Dmuvoa.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\Dmuvoa.exe d6d645b00bde814fd35edb3c07d72a80.exe File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Dmuvoa.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Dmuvoa.exe File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job d6d645b00bde814fd35edb3c07d72a80.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job d6d645b00bde814fd35edb3c07d72a80.exe File created C:\Windows\Dmuvoa.exe d6d645b00bde814fd35edb3c07d72a80.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Software\Microsoft\Internet Explorer\Main Dmuvoa.exe Key created \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Software\Microsoft\Internet Explorer\International Dmuvoa.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2984 Dmuvoa.exe 2984 Dmuvoa.exe 2984 Dmuvoa.exe 2984 Dmuvoa.exe 2984 Dmuvoa.exe 2984 Dmuvoa.exe 2984 Dmuvoa.exe 2984 Dmuvoa.exe 2984 Dmuvoa.exe 2984 Dmuvoa.exe 2984 Dmuvoa.exe 2984 Dmuvoa.exe 2984 Dmuvoa.exe 2984 Dmuvoa.exe 2984 Dmuvoa.exe 2984 Dmuvoa.exe 2984 Dmuvoa.exe 2984 Dmuvoa.exe 2984 Dmuvoa.exe 2984 Dmuvoa.exe 2984 Dmuvoa.exe 2984 Dmuvoa.exe 2984 Dmuvoa.exe 2984 Dmuvoa.exe 2984 Dmuvoa.exe 2984 Dmuvoa.exe 2984 Dmuvoa.exe 2984 Dmuvoa.exe 2984 Dmuvoa.exe 2984 Dmuvoa.exe 2984 Dmuvoa.exe 2984 Dmuvoa.exe 2984 Dmuvoa.exe 2984 Dmuvoa.exe 2984 Dmuvoa.exe 2984 Dmuvoa.exe 2984 Dmuvoa.exe 2984 Dmuvoa.exe 2984 Dmuvoa.exe 2984 Dmuvoa.exe 2984 Dmuvoa.exe 2984 Dmuvoa.exe 2984 Dmuvoa.exe 2984 Dmuvoa.exe 2984 Dmuvoa.exe 2984 Dmuvoa.exe 2984 Dmuvoa.exe 2984 Dmuvoa.exe 2984 Dmuvoa.exe 2984 Dmuvoa.exe 2984 Dmuvoa.exe 2984 Dmuvoa.exe 2984 Dmuvoa.exe 2984 Dmuvoa.exe 2984 Dmuvoa.exe 2984 Dmuvoa.exe 2984 Dmuvoa.exe 2984 Dmuvoa.exe 2984 Dmuvoa.exe 2984 Dmuvoa.exe 2984 Dmuvoa.exe 2984 Dmuvoa.exe 2984 Dmuvoa.exe 2984 Dmuvoa.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1988 wrote to memory of 2984 1988 d6d645b00bde814fd35edb3c07d72a80.exe 90 PID 1988 wrote to memory of 2984 1988 d6d645b00bde814fd35edb3c07d72a80.exe 90 PID 1988 wrote to memory of 2984 1988 d6d645b00bde814fd35edb3c07d72a80.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\d6d645b00bde814fd35edb3c07d72a80.exe"C:\Users\Admin\AppData\Local\Temp\d6d645b00bde814fd35edb3c07d72a80.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\Dmuvoa.exeC:\Windows\Dmuvoa.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:2984
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
125KB
MD5d6d645b00bde814fd35edb3c07d72a80
SHA1764781724b5af6d9f14cf4d0463271ea05358ce8
SHA256e6171ffbc8e0cd50e6136464a37763fd748502030b62519867e4f9e994a83bc4
SHA512227b00b51f90f3f196676fd010c3801062e07b110fd2aeb182e32c0000242dd7672fd4e49242b998706ddec084c13ba66588bcea521f021096eeaf6fb0840a2f
-
Filesize
362B
MD568910acc33c78d38bfb6551436719bc5
SHA17f27c532dccf23cb8078f330913136416f1be483
SHA25632dc01826c865846c2dd50cfa0fc3df9b5a6dee014577e1fcd62dd4d017c8457
SHA5125cc0050bfb992aeae00e95d6001abb380c325ab735b68f66a34761dcb8a2b3dfc796e28ce97f608a0d991ade2874dc71fba500b0a80d49f0b94bba4fa05a9202