Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10/05/2024, 21:03
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
unbranded.exe
Resource
win10v2004-20240508-en
7 signatures
150 seconds
General
-
Target
unbranded.exe
-
Size
43.0MB
-
MD5
292d7599721809df55d794067b069e21
-
SHA1
218c6e4a91cdd1894b4cb12fdad028a312f84367
-
SHA256
39f631d14f7eda098f11a8fc8e19e490514fb3d8c76f9541c9406d0427431d67
-
SHA512
2612fadd960b0b65f9464877fda7f0942bb3b9ec246efcea0bb80f112328d3272d439621a524702ad28818a6b07be9e57c0edce772921b73c5ac639b23201de1
-
SSDEEP
786432:jJmC/YZQpmme7kkJ1NpwXrJPVZ0GLoUfyp/1cxdzmTmxlJ/KD4:8C/YeQXP6rPeGEUA/1My4lJ/c4
Score
8/10
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts unbranded.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 20 api.ipify.org 21 api.ipify.org -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 unbranded.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum unbranded.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 1868 unbranded.exe 1868 unbranded.exe 1868 unbranded.exe 1868 unbranded.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1868 unbranded.exe 1868 unbranded.exe 1868 unbranded.exe 1868 unbranded.exe 1868 unbranded.exe 1868 unbranded.exe 1868 unbranded.exe 1868 unbranded.exe 1868 unbranded.exe 1868 unbranded.exe 1868 unbranded.exe 1868 unbranded.exe 1868 unbranded.exe 1868 unbranded.exe 1868 unbranded.exe 1868 unbranded.exe 1868 unbranded.exe 1868 unbranded.exe 1868 unbranded.exe 1868 unbranded.exe 1868 unbranded.exe 1868 unbranded.exe 1868 unbranded.exe 1868 unbranded.exe 1868 unbranded.exe 1868 unbranded.exe 1868 unbranded.exe 1868 unbranded.exe 1868 unbranded.exe 1868 unbranded.exe 1868 unbranded.exe 1868 unbranded.exe 1868 unbranded.exe 1868 unbranded.exe 1868 unbranded.exe 1868 unbranded.exe 1868 unbranded.exe 1868 unbranded.exe 1868 unbranded.exe 1868 unbranded.exe 1868 unbranded.exe 1868 unbranded.exe 1868 unbranded.exe 1868 unbranded.exe 1868 unbranded.exe 1868 unbranded.exe 1868 unbranded.exe 1868 unbranded.exe 1868 unbranded.exe 1868 unbranded.exe 1868 unbranded.exe 1868 unbranded.exe 1868 unbranded.exe 1868 unbranded.exe 1868 unbranded.exe 1868 unbranded.exe 1868 unbranded.exe 1868 unbranded.exe 1868 unbranded.exe 1868 unbranded.exe 1868 unbranded.exe 1868 unbranded.exe 1868 unbranded.exe 1868 unbranded.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1868 unbranded.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1868 wrote to memory of 4544 1868 unbranded.exe 93 PID 1868 wrote to memory of 4544 1868 unbranded.exe 93 PID 1868 wrote to memory of 1448 1868 unbranded.exe 94 PID 1868 wrote to memory of 1448 1868 unbranded.exe 94 PID 1448 wrote to memory of 3036 1448 cmd.exe 95 PID 1448 wrote to memory of 3036 1448 cmd.exe 95 PID 1448 wrote to memory of 4684 1448 cmd.exe 96 PID 1448 wrote to memory of 4684 1448 cmd.exe 96 PID 1448 wrote to memory of 4052 1448 cmd.exe 97 PID 1448 wrote to memory of 4052 1448 cmd.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\unbranded.exe"C:\Users\Admin\AppData\Local\Temp\unbranded.exe"1⤵
- Drops file in Drivers directory
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c Cls2⤵PID:4544
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\unbranded.exe" MD5 | find /i /v "md5" | find /i /v "certutil"2⤵
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Windows\system32\certutil.execertutil -hashfile "C:\Users\Admin\AppData\Local\Temp\unbranded.exe" MD53⤵PID:3036
-
-
C:\Windows\system32\find.exefind /i /v "md5"3⤵PID:4684
-
-
C:\Windows\system32\find.exefind /i /v "certutil"3⤵PID:4052
-
-