Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/04/2024, 03:01

General

  • Target

    3077a0cf634319e7cd4ebe8ee0416c809bffc0099b5700e19b72e882afe3bd4b.exe

  • Size

    73KB

  • MD5

    6a0793ab2ddc8c9a85e74c85acca87aa

  • SHA1

    68e3299f98b63da0c7f950e3338568391df18831

  • SHA256

    3077a0cf634319e7cd4ebe8ee0416c809bffc0099b5700e19b72e882afe3bd4b

  • SHA512

    2a4bd12560f1f0a5e5a8c614b749fdfaf259f82ea702f48bdf86e71d38f02f4381a3df81be82366fedb7c4e9ae5efd5dc84aa8e46116d66ddeb0ea27f2d64722

  • SSDEEP

    768:agO5xRYi+SfSWHHNvvG5bnl/NqNwsKVDstHxYD0p1aXKynF0vQmYZS0HdJnfWO3R:RshfSWHHNvoLqNwDDGw02eQmh0HjWO3R

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Modifies system executable filetype association 2 TTPs 5 IoCs
  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3077a0cf634319e7cd4ebe8ee0416c809bffc0099b5700e19b72e882afe3bd4b.exe
    "C:\Users\Admin\AppData\Local\Temp\3077a0cf634319e7cd4ebe8ee0416c809bffc0099b5700e19b72e882afe3bd4b.exe"
    1⤵
    • Modifies system executable filetype association
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4412
    • C:\Windows\system\rundll32.exe
      C:\Windows\system\rundll32.exe
      2⤵
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:2312

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\notepad¢¬.exe

    Filesize

    76KB

    MD5

    5b7f2a156db3d8b4ef81b405bce3b400

    SHA1

    2a9cc4cd58535c67197245584b5d323e942c5231

    SHA256

    f8d5a434132f495171e672589c72cc30157924cf9b22d59a5c0a9e5a4b7f463a

    SHA512

    b3e2d4904ab0506ae7df1d701a9214247970e2c6a7cf30d4c33db241329c3758c6d6061376223b0e071f9bdc4c457151df01601bbc1d18de2c3ac22e4e952cbd

  • C:\Windows\System\rundll32.exe

    Filesize

    84KB

    MD5

    39e92a89a7c6940deacc45ef9c8765b5

    SHA1

    1c276dccfab612cb3eeddb2593b674cf1b97f33e

    SHA256

    011c9cf0e00a7303172dafd564c91dd0705b0afc1051b5e1c8bf872bb608bd32

    SHA512

    8daf5c4fef740b8bdbc2238cc4f71055d858bdb3d2ab5732258539af042c9ec9aae5c58f3bffe4c67ec5936afef62b076034f337c99a7360325a189900bde3e1

  • memory/4412-0-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB

  • memory/4412-13-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB