Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1802s -
max time network
1804s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
12/05/2024, 17:27
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
tulpical windows yes.exe
Resource
win10v2004-20240226-en
4 signatures
1800 seconds
General
-
Target
tulpical windows yes.exe
-
Size
1.9MB
-
MD5
6d85f29c6c6967c3c2efcc5fe662926b
-
SHA1
b512f8e18d134bd07f3a3693bb28b6c3f18d5405
-
SHA256
5cdc5ec49208506dbb6c37c8c20a23a40dadd6ea2e42de363b56869da63aa552
-
SHA512
19da87234fa5e962cec7cc21f70d9f26b78b8c1043dabf5964740b722fadd691cbf91d2e4cb1c644a2c1ea1a0d64ad48dddbdb98c19ebb84e8cb15596657ba67
-
SSDEEP
49152:Yzv49bQkkAZ7ZDuHKKR5U73BGXwUnQ3SJtrBmO7iReEL:AvPJABwOyJ3t7Ke
Score
8/10
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\frAQBc8Wsa1xVPfv\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\frAQBc8Wsa1xVPfv" tulpical windows yes.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 652 tulpical windows yes.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLoadDriverPrivilege 652 tulpical windows yes.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 652 wrote to memory of 4848 652 tulpical windows yes.exe 91 PID 652 wrote to memory of 4848 652 tulpical windows yes.exe 91 PID 652 wrote to memory of 2856 652 tulpical windows yes.exe 92 PID 652 wrote to memory of 2856 652 tulpical windows yes.exe 92 PID 2856 wrote to memory of 224 2856 cmd.exe 93 PID 2856 wrote to memory of 224 2856 cmd.exe 93 PID 2856 wrote to memory of 3764 2856 cmd.exe 94 PID 2856 wrote to memory of 3764 2856 cmd.exe 94 PID 2856 wrote to memory of 4020 2856 cmd.exe 95 PID 2856 wrote to memory of 4020 2856 cmd.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\tulpical windows yes.exe"C:\Users\Admin\AppData\Local\Temp\tulpical windows yes.exe"1⤵
- Sets service image path in registry
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c Color 9F2⤵PID:4848
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\tulpical windows yes.exe" MD5 | find /i /v "md5" | find /i /v "certutil"2⤵
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\system32\certutil.execertutil -hashfile "C:\Users\Admin\AppData\Local\Temp\tulpical windows yes.exe" MD53⤵PID:224
-
-
C:\Windows\system32\find.exefind /i /v "md5"3⤵PID:3764
-
-
C:\Windows\system32\find.exefind /i /v "certutil"3⤵PID:4020
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4076 --field-trial-handle=1928,i,13242902252791919845,10377620236057253993,262144 --variations-seed-version /prefetch:81⤵PID:1484
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3664 --field-trial-handle=1928,i,13242902252791919845,10377620236057253993,262144 --variations-seed-version /prefetch:81⤵PID:2268