Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/04/2024, 12:41

General

  • Target

    90fb0cd574155fd8667d20f97ac464eca67bdb6a8ee64184159362d45d79b6a4.exe

  • Size

    19.9MB

  • MD5

    6c2b947921e7c77d9af62ce9a3ed7621

  • SHA1

    a6d63439404b38f28606566f8b95298c624bc1e1

  • SHA256

    90fb0cd574155fd8667d20f97ac464eca67bdb6a8ee64184159362d45d79b6a4

  • SHA512

    40bd24d0608d6b9f67e6b00a3229a277b493dbe2915ad41e312e28401e8122899bdcf5d36a7264b5ac18baf4ee7223078a7f32d4502b3b4b26c819972b6af35b

  • SSDEEP

    393216:zH87L27+TpjMwyQQhZrZ/dM35quJsv6tWKFdu9Cfz:e20pjMw0hZrZ+5q4

Score
10/10

Malware Config

Signatures

  • Detected MagicRAT payload 3 IoCs
  • magicrat

    MagicRAT is a remote access trojan developed and operated by the Lazarus APT group.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\90fb0cd574155fd8667d20f97ac464eca67bdb6a8ee64184159362d45d79b6a4.exe
    "C:\Users\Admin\AppData\Local\Temp\90fb0cd574155fd8667d20f97ac464eca67bdb6a8ee64184159362d45d79b6a4.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3632
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c bcdedit
      2⤵
        PID:4332
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c schtasks /create /tn "Microsoft\Windows\mkSandbox Service Manager" /tr C:/Users/Admin/AppData/Local/Temp/90fb0cd574155fd8667d20f97ac464eca67bdb6a8ee64184159362d45d79b6a4.exe /sc daily /st 10:20:30 /ru SYSTEM
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1044
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /create /tn "Microsoft\Windows\mkSandbox Service Manager" /tr C:/Users/Admin/AppData/Local/Temp/90fb0cd574155fd8667d20f97ac464eca67bdb6a8ee64184159362d45d79b6a4.exe /sc daily /st 10:20:30 /ru SYSTEM
          3⤵
          • Creates scheduled task(s)
          PID:388

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3632-5-0x0000000000400000-0x00000000017F4000-memory.dmp

      Filesize

      20.0MB

    • memory/3632-24-0x0000000000400000-0x00000000017F4000-memory.dmp

      Filesize

      20.0MB

    • memory/3632-25-0x0000000000400000-0x00000000017F4000-memory.dmp

      Filesize

      20.0MB