Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
45s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
02/05/2024, 19:51
Static task
static1
Behavioral task
behavioral1
Sample
2861850b353799786f5e8f22753cd82cfc887ea6472c9f14abaf57c595101b79.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2861850b353799786f5e8f22753cd82cfc887ea6472c9f14abaf57c595101b79.exe
Resource
win10v2004-20240226-en
General
-
Target
2861850b353799786f5e8f22753cd82cfc887ea6472c9f14abaf57c595101b79.exe
-
Size
615KB
-
MD5
cd5a3037f111dd08a62a1dfaea55fe15
-
SHA1
6410cbbb863d904fa789fa22c8a0aa771c2111f8
-
SHA256
2861850b353799786f5e8f22753cd82cfc887ea6472c9f14abaf57c595101b79
-
SHA512
63dd7f43a6c87b55bee27f7a8fd0815c40ee3fc66095aa48666b90ee3e31e16097ef807711799c45f77c0685daef43dbcf8af458289f7858d1bdf248aee58b0a
-
SSDEEP
12288:wlbX+Waplw9U+qMi8CtdVldusIh6BBHCHrKZXCktSzIzWpX5x:WbX+NYTqMi8CtBd2QHCHmTBW5x
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 8 IoCs
resource yara_rule behavioral2/memory/4160-0-0x0000000000400000-0x000000000041B000-memory.dmp UPX behavioral2/files/0x0008000000023258-3.dat UPX behavioral2/memory/4160-7-0x0000000000400000-0x000000000041B000-memory.dmp UPX behavioral2/memory/3856-16-0x0000000000400000-0x000000000041B000-memory.dmp UPX behavioral2/files/0x000700000002325b-14.dat UPX behavioral2/memory/3856-18-0x0000000000400000-0x000000000041B000-memory.dmp UPX behavioral2/memory/2236-21-0x0000000000400000-0x000000000041B000-memory.dmp UPX behavioral2/memory/4296-22-0x0000000000400000-0x000000000041B000-memory.dmp UPX -
Executes dropped EXE 4 IoCs
pid Process 4296 MSWDM.EXE 2236 MSWDM.EXE 2644 2861850B353799786F5E8F22753CD82CFC887EA6472C9F14ABAF57C595101B79.EXE 3856 MSWDM.EXE -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" 2861850b353799786f5e8f22753cd82cfc887ea6472c9f14abaf57c595101b79.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" 2861850b353799786f5e8f22753cd82cfc887ea6472c9f14abaf57c595101b79.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\WINDOWS\MSWDM.EXE 2861850b353799786f5e8f22753cd82cfc887ea6472c9f14abaf57c595101b79.exe File opened for modification C:\Windows\devEE19.tmp 2861850b353799786f5e8f22753cd82cfc887ea6472c9f14abaf57c595101b79.exe File opened for modification C:\Windows\devEE19.tmp MSWDM.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2236 MSWDM.EXE 2236 MSWDM.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4160 wrote to memory of 4296 4160 2861850b353799786f5e8f22753cd82cfc887ea6472c9f14abaf57c595101b79.exe 90 PID 4160 wrote to memory of 4296 4160 2861850b353799786f5e8f22753cd82cfc887ea6472c9f14abaf57c595101b79.exe 90 PID 4160 wrote to memory of 4296 4160 2861850b353799786f5e8f22753cd82cfc887ea6472c9f14abaf57c595101b79.exe 90 PID 4160 wrote to memory of 2236 4160 2861850b353799786f5e8f22753cd82cfc887ea6472c9f14abaf57c595101b79.exe 91 PID 4160 wrote to memory of 2236 4160 2861850b353799786f5e8f22753cd82cfc887ea6472c9f14abaf57c595101b79.exe 91 PID 4160 wrote to memory of 2236 4160 2861850b353799786f5e8f22753cd82cfc887ea6472c9f14abaf57c595101b79.exe 91 PID 2236 wrote to memory of 2644 2236 MSWDM.EXE 92 PID 2236 wrote to memory of 2644 2236 MSWDM.EXE 92 PID 2236 wrote to memory of 3856 2236 MSWDM.EXE 93 PID 2236 wrote to memory of 3856 2236 MSWDM.EXE 93 PID 2236 wrote to memory of 3856 2236 MSWDM.EXE 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\2861850b353799786f5e8f22753cd82cfc887ea6472c9f14abaf57c595101b79.exe"C:\Users\Admin\AppData\Local\Temp\2861850b353799786f5e8f22753cd82cfc887ea6472c9f14abaf57c595101b79.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4296
-
-
C:\WINDOWS\MSWDM.EXE-r!C:\Windows\devEE19.tmp!C:\Users\Admin\AppData\Local\Temp\2861850b353799786f5e8f22753cd82cfc887ea6472c9f14abaf57c595101b79.exe! !2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\2861850B353799786F5E8F22753CD82CFC887EA6472C9F14ABAF57C595101B79.EXE
- Executes dropped EXE
PID:2644
-
-
C:\WINDOWS\MSWDM.EXE-e!C:\Windows\devEE19.tmp!C:\Users\Admin\AppData\Local\Temp\2861850B353799786F5E8F22753CD82CFC887EA6472C9F14ABAF57C595101B79.EXE!3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3856
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4104 --field-trial-handle=2280,i,11703952675008463361,17436195144517971517,262144 --variations-seed-version /prefetch:81⤵PID:4980
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\2861850B353799786F5E8F22753CD82CFC887EA6472C9F14ABAF57C595101B79.EXE
Filesize615KB
MD550ebf89fe8272a40454e9bdc00ad4cb4
SHA1fe75e72429325b0ff4175864d7058a48f25c56b1
SHA256b029566c0639c177b5a6113f73f3ab087d9e2f4de6470951cb9e09ac897eee24
SHA512dfd891307476475b56e9642b3a46a6d2e2d9ddc53ec0349b15528b41022b8bdb10bc82f19c0c66a0ee7efcef9486f41a99d338bbdf5991fbf936d67b41258326
-
Filesize
47KB
MD5336ffd74e5eb29bc13e4e0f5de0cb57a
SHA1fb3bab77482267f8880cd329d926a41d397d072d
SHA256688c0c407e9651d4fb63017475f3ca304c7ff8c0185592c3a1d7d3b660098c79
SHA512e8e70882eebbb5a602ac68a4a51a15c7d32d083b5c5717981a9b33d358e17411a0fee1294b631f29f0f5cf06e0ad86109198de6114ba364fdaac1e866a049d76
-
Filesize
568KB
MD504fb3ae7f05c8bc333125972ba907398
SHA1df22612647e9404a515d48ebad490349685250de
SHA2562fb898bacb587f2484c9c4aa6da2729079d93d1f923a017bb84beef87bf74fef
SHA51294c164a0b884c939ece30f5038d07b756702998d46786f9f613fbea2eb30bed4bc19a409f347bb4cc565898473b18155d580b453683223beaf30ed4079c251b2