Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19/03/2024, 20:32
Behavioral task
behavioral1
Sample
5b22095d459789fb7fec4eb7e019b4722a05d580e94f5262ff4eb76f8035e67d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5b22095d459789fb7fec4eb7e019b4722a05d580e94f5262ff4eb76f8035e67d.exe
Resource
win10v2004-20240226-en
General
-
Target
5b22095d459789fb7fec4eb7e019b4722a05d580e94f5262ff4eb76f8035e67d.exe
-
Size
248KB
-
MD5
59d1930d65dccb7a869f1de656f66117
-
SHA1
7b87d2b84144b34b926404e6c4f5f0bda26d9795
-
SHA256
5b22095d459789fb7fec4eb7e019b4722a05d580e94f5262ff4eb76f8035e67d
-
SHA512
da76ceac4c73298395396b442e4e9128e1015779bd003a938796576a5739f36bfba97fbeb215907d1a4d86d55c583a302255bca5d6915c74b63dc94f32cd181e
-
SSDEEP
3072:mW6hAY6DxQKBL+UjcjR/6HAQ8S138WtA7Kzfk0sa73:mW6hINR+Uwl6HlXA78fJsa73
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 4 IoCs
resource yara_rule behavioral2/memory/2028-0-0x0000000000400000-0x000000000043E000-memory.dmp UPX behavioral2/files/0x00080000000231fa-7.dat UPX behavioral2/memory/2028-9-0x0000000000400000-0x000000000043E000-memory.dmp UPX behavioral2/memory/5036-16-0x0000000000400000-0x000000000043E000-memory.dmp UPX -
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 5036 npprbsm.exe -
resource yara_rule behavioral2/memory/2028-0-0x0000000000400000-0x000000000043E000-memory.dmp upx behavioral2/files/0x00080000000231fa-7.dat upx behavioral2/memory/2028-9-0x0000000000400000-0x000000000043E000-memory.dmp upx behavioral2/memory/5036-16-0x0000000000400000-0x000000000043E000-memory.dmp upx -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\npprbsm.exe 5b22095d459789fb7fec4eb7e019b4722a05d580e94f5262ff4eb76f8035e67d.exe File created C:\PROGRA~3\Mozilla\yqwyzrf.dll npprbsm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b22095d459789fb7fec4eb7e019b4722a05d580e94f5262ff4eb76f8035e67d.exe"C:\Users\Admin\AppData\Local\Temp\5b22095d459789fb7fec4eb7e019b4722a05d580e94f5262ff4eb76f8035e67d.exe"1⤵
- Drops file in Program Files directory
PID:2028
-
C:\PROGRA~3\Mozilla\npprbsm.exeC:\PROGRA~3\Mozilla\npprbsm.exe -eqrcqtf1⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:5036
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
248KB
MD5409353de88d03405c61929a03692e8a3
SHA1e22468c915ed391eaf8a3d81f74a6a0add449d3c
SHA2569825769d552f4cedff09c8372924fcf3a393bcb7e0a8515a81d0c30701dc2376
SHA512f1301925b402cab255fe8542e643a12c6898f515a94e8a6ecb35c5918ff1d90a7cdf5fdcf57bcedd3a4b0c40923e5ce72ec94fe26825fc77243910bfb80ae642