Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
162s -
max time network
174s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/04/2024, 21:39
Behavioral task
behavioral1
Sample
1d15d41b16193d89eb52781c86f9eb4c.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1d15d41b16193d89eb52781c86f9eb4c.exe
Resource
win10v2004-20240226-en
General
-
Target
1d15d41b16193d89eb52781c86f9eb4c.exe
-
Size
107KB
-
MD5
1d15d41b16193d89eb52781c86f9eb4c
-
SHA1
39d32c1acdc0199734741ba2a9394f34357f0152
-
SHA256
7130128c5bf964cc12d98bcdbf05b4420c7e29b81ba88006040dc96ec5981aed
-
SHA512
5fee4f0538b33f4741435bea6b16d0a3bbcd2878022ce931132120121faa7b6f82a4b8f2a6e0e39df1047019ada6d13617417be8e93511238f1c265579b7279e
-
SSDEEP
1536:1MRxANjduCoaYp8iJVmrsA8tx0Z8IYHPp8x5OVB80/TsrWFISJ/uxzNLC1Br5reg:1ZduCcp8iJUAAkRc5gJTjFXIx61N7
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1464-0-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral2/files/0x0003000000022d25-5.dat upx behavioral2/memory/1464-18-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral2/memory/1464-19-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral2/memory/1464-20-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral2/memory/1464-21-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral2/memory/1464-22-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral2/memory/1464-23-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral2/memory/1464-24-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral2/memory/1464-25-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral2/memory/1464-26-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral2/memory/1464-27-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral2/memory/1464-28-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral2/memory/1464-29-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral2/memory/1464-30-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral2/memory/1464-31-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral2/memory/1464-32-0x0000000000400000-0x0000000000417000-memory.dmp upx -
Drops file in Windows directory 17 IoCs
description ioc Process File opened for modification C:\Windows\win32dc\Quake3 + patch.exe 1d15d41b16193d89eb52781c86f9eb4c.exe File opened for modification C:\Windows\win32dc\Sims 2_codes.exe 1d15d41b16193d89eb52781c86f9eb4c.exe File created C:\Windows\win32dc\Silent Hill 4_trainer.exe 1d15d41b16193d89eb52781c86f9eb4c.exe File opened for modification C:\Windows\win32dc\Silent Hill 4_trainer.exe 1d15d41b16193d89eb52781c86f9eb4c.exe File opened for modification C:\Windows\win32dc\DAoC patch.exe 1d15d41b16193d89eb52781c86f9eb4c.exe File created C:\Windows\win32dc\Silent Hill 4 patch.exe 1d15d41b16193d89eb52781c86f9eb4c.exe File created C:\Windows\win32dc\BattleField 1942_fix.exe 1d15d41b16193d89eb52781c86f9eb4c.exe File opened for modification C:\Windows\win32dc\UT2004(cdfix).exe 1d15d41b16193d89eb52781c86f9eb4c.exe File created C:\Windows\win32dc\Quake3 + nocd.exe 1d15d41b16193d89eb52781c86f9eb4c.exe File opened for modification C:\Windows\win32dc\Quake3 + nocd.exe 1d15d41b16193d89eb52781c86f9eb4c.exe File created C:\Windows\win32dc\UT2004(cdfix).exe 1d15d41b16193d89eb52781c86f9eb4c.exe File created C:\Windows\win32dc\DAoC patch.exe 1d15d41b16193d89eb52781c86f9eb4c.exe File created C:\Windows\win32dc\Quake3 + patch.exe 1d15d41b16193d89eb52781c86f9eb4c.exe File created C:\Windows\win32dc\Half-Life 2 + fix.exe 1d15d41b16193d89eb52781c86f9eb4c.exe File created C:\Windows\win32dc\Sims 2_codes.exe 1d15d41b16193d89eb52781c86f9eb4c.exe File opened for modification C:\Windows\win32dc\BattleField 1942_fix.exe 1d15d41b16193d89eb52781c86f9eb4c.exe File created C:\Windows\win32dc\Silent Hill 4_codes.exe 1d15d41b16193d89eb52781c86f9eb4c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d15d41b16193d89eb52781c86f9eb4c.exe"C:\Users\Admin\AppData\Local\Temp\1d15d41b16193d89eb52781c86f9eb4c.exe"1⤵
- Drops file in Windows directory
PID:1464
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=2268 --field-trial-handle=2244,i,11878111470816612087,2265290141962607370,262144 --variations-seed-version /prefetch:81⤵PID:2704
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
107KB
MD5327ece6391beedf3f9b104e55e7349a8
SHA10f97d93f8a19826b3b12ca2065b2aa374249a2c4
SHA2564ccd3ec613d91bd0fa0f2a839c682047958dc96f9d85a7d240ac824c856986ac
SHA5120fde7ab9b65b58713115ccad97aca83c83a06ca2caba494ab448612cee05c576f5f6ccb21b24daabee9b808c714a304df36d2c9bc0fcc2fbd677400c2aba0468