Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10/04/2024, 12:41
Behavioral task
behavioral1
Sample
90fb0cd574155fd8667d20f97ac464eca67bdb6a8ee64184159362d45d79b6a4.exe
Resource
win7-20231129-en
5 signatures
150 seconds
General
-
Target
90fb0cd574155fd8667d20f97ac464eca67bdb6a8ee64184159362d45d79b6a4.exe
-
Size
19.9MB
-
MD5
6c2b947921e7c77d9af62ce9a3ed7621
-
SHA1
a6d63439404b38f28606566f8b95298c624bc1e1
-
SHA256
90fb0cd574155fd8667d20f97ac464eca67bdb6a8ee64184159362d45d79b6a4
-
SHA512
40bd24d0608d6b9f67e6b00a3229a277b493dbe2915ad41e312e28401e8122899bdcf5d36a7264b5ac18baf4ee7223078a7f32d4502b3b4b26c819972b6af35b
-
SSDEEP
393216:zH87L27+TpjMwyQQhZrZ/dM35quJsv6tWKFdu9Cfz:e20pjMw0hZrZ+5q4
Malware Config
Signatures
-
Detected MagicRAT payload 3 IoCs
resource yara_rule behavioral2/memory/3632-5-0x0000000000400000-0x00000000017F4000-memory.dmp family_magicrat behavioral2/memory/3632-24-0x0000000000400000-0x00000000017F4000-memory.dmp family_magicrat behavioral2/memory/3632-25-0x0000000000400000-0x00000000017F4000-memory.dmp family_magicrat -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 388 schtasks.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3632 90fb0cd574155fd8667d20f97ac464eca67bdb6a8ee64184159362d45d79b6a4.exe 3632 90fb0cd574155fd8667d20f97ac464eca67bdb6a8ee64184159362d45d79b6a4.exe 3632 90fb0cd574155fd8667d20f97ac464eca67bdb6a8ee64184159362d45d79b6a4.exe 3632 90fb0cd574155fd8667d20f97ac464eca67bdb6a8ee64184159362d45d79b6a4.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3632 wrote to memory of 4332 3632 90fb0cd574155fd8667d20f97ac464eca67bdb6a8ee64184159362d45d79b6a4.exe 98 PID 3632 wrote to memory of 4332 3632 90fb0cd574155fd8667d20f97ac464eca67bdb6a8ee64184159362d45d79b6a4.exe 98 PID 3632 wrote to memory of 4332 3632 90fb0cd574155fd8667d20f97ac464eca67bdb6a8ee64184159362d45d79b6a4.exe 98 PID 3632 wrote to memory of 1044 3632 90fb0cd574155fd8667d20f97ac464eca67bdb6a8ee64184159362d45d79b6a4.exe 100 PID 3632 wrote to memory of 1044 3632 90fb0cd574155fd8667d20f97ac464eca67bdb6a8ee64184159362d45d79b6a4.exe 100 PID 3632 wrote to memory of 1044 3632 90fb0cd574155fd8667d20f97ac464eca67bdb6a8ee64184159362d45d79b6a4.exe 100 PID 1044 wrote to memory of 388 1044 cmd.exe 102 PID 1044 wrote to memory of 388 1044 cmd.exe 102 PID 1044 wrote to memory of 388 1044 cmd.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\90fb0cd574155fd8667d20f97ac464eca67bdb6a8ee64184159362d45d79b6a4.exe"C:\Users\Admin\AppData\Local\Temp\90fb0cd574155fd8667d20f97ac464eca67bdb6a8ee64184159362d45d79b6a4.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Windows\SysWOW64\cmd.execmd.exe /c bcdedit2⤵PID:4332
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks /create /tn "Microsoft\Windows\mkSandbox Service Manager" /tr C:/Users/Admin/AppData/Local/Temp/90fb0cd574155fd8667d20f97ac464eca67bdb6a8ee64184159362d45d79b6a4.exe /sc daily /st 10:20:30 /ru SYSTEM2⤵
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "Microsoft\Windows\mkSandbox Service Manager" /tr C:/Users/Admin/AppData/Local/Temp/90fb0cd574155fd8667d20f97ac464eca67bdb6a8ee64184159362d45d79b6a4.exe /sc daily /st 10:20:30 /ru SYSTEM3⤵
- Creates scheduled task(s)
PID:388
-
-