Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/03/2024, 17:50
Behavioral task
behavioral1
Sample
2a8a678f8da52aaf164d6cd177ccb29693d1c1b1f32bc0de701a5ec98944a316.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2a8a678f8da52aaf164d6cd177ccb29693d1c1b1f32bc0de701a5ec98944a316.exe
Resource
win10v2004-20231215-en
General
-
Target
2a8a678f8da52aaf164d6cd177ccb29693d1c1b1f32bc0de701a5ec98944a316.exe
-
Size
453KB
-
MD5
6e78ddea5e9b567e9afc0511f6fdd0ab
-
SHA1
3f0cb1a90c76a12536277af1f936a14a62fcfe2a
-
SHA256
2a8a678f8da52aaf164d6cd177ccb29693d1c1b1f32bc0de701a5ec98944a316
-
SHA512
f582e68ed23ba3a620174c281710bf982f48600c1b7ff42e9cb30cec26491a85f799496a3ebad708c0d5504faecbc658919f0b80d32528ac85bf81aa56ebdfbd
-
SSDEEP
6144:8kLYyvZFsjpHQvXrlHyJzVJot3aERiLTwEYYxNdZ:8kLYyourOWaE0TGY
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3552 sysctl.exe -
Modifies system executable filetype association 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 2a8a678f8da52aaf164d6cd177ccb29693d1c1b1f32bc0de701a5ec98944a316.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\SysWow64\\realex.exe \"%1\" %*" 2a8a678f8da52aaf164d6cd177ccb29693d1c1b1f32bc0de701a5ec98944a316.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command sysctl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\SysWow64\\realex.exe \"%1\" %*" sysctl.exe -
resource yara_rule behavioral2/memory/5072-0-0x0000000000400000-0x0000000000461000-memory.dmp upx behavioral2/files/0x0010000000023153-5.dat upx behavioral2/memory/5072-8-0x0000000000400000-0x0000000000461000-memory.dmp upx behavioral2/memory/3552-9-0x0000000000400000-0x0000000000461000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\sysctl.exe = "C:\\Windows\\system32\\sysctl.exe" 2a8a678f8da52aaf164d6cd177ccb29693d1c1b1f32bc0de701a5ec98944a316.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\sysctl.exe 2a8a678f8da52aaf164d6cd177ccb29693d1c1b1f32bc0de701a5ec98944a316.exe File created C:\Windows\SysWOW64\realex.exe 2a8a678f8da52aaf164d6cd177ccb29693d1c1b1f32bc0de701a5ec98944a316.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 2a8a678f8da52aaf164d6cd177ccb29693d1c1b1f32bc0de701a5ec98944a316.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\SysWow64\\realex.exe \"%1\" %*" 2a8a678f8da52aaf164d6cd177ccb29693d1c1b1f32bc0de701a5ec98944a316.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command sysctl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\SysWow64\\realex.exe \"%1\" %*" sysctl.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3552 sysctl.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5072 wrote to memory of 3552 5072 2a8a678f8da52aaf164d6cd177ccb29693d1c1b1f32bc0de701a5ec98944a316.exe 85 PID 5072 wrote to memory of 3552 5072 2a8a678f8da52aaf164d6cd177ccb29693d1c1b1f32bc0de701a5ec98944a316.exe 85 PID 5072 wrote to memory of 3552 5072 2a8a678f8da52aaf164d6cd177ccb29693d1c1b1f32bc0de701a5ec98944a316.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a8a678f8da52aaf164d6cd177ccb29693d1c1b1f32bc0de701a5ec98944a316.exe"C:\Users\Admin\AppData\Local\Temp\2a8a678f8da52aaf164d6cd177ccb29693d1c1b1f32bc0de701a5ec98944a316.exe"1⤵
- Modifies system executable filetype association
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Windows\SysWOW64\sysctl.exeC:\Windows\system32\sysctl.exe2⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:3552
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
454KB
MD5a1afda57c228671b7918205325b27b4b
SHA1948b59fce2942556d7ff37f6b4801f6a5da31208
SHA25631a887e94d5ea678e816d13c3931c671fa8fc90474dacb3af1521ed4463b42b3
SHA512e25889c1463343255e2f4b182bcf2d567910200e33785feface66248432cccc8d09d2b618fe8eb6fb78297303dd0e0f377dcde669b3b502c3291fe478a678d6a