Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1791s -
max time network
1179s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
19/05/2024, 22:52
Static task
static1
Behavioral task
behavioral1
Sample
Xfer_KeyGen.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
$TEMP/BASSMOD.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
$TEMP/R2RXFEKG.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
$TEMP/keygen.exe
Resource
win10v2004-20240508-en
General
-
Target
Xfer_KeyGen.exe
-
Size
559KB
-
MD5
3502197687f3356bc50ab03329831d22
-
SHA1
a6ad8b22a2a45eda34c64d33e55236e3d3cf440e
-
SHA256
29e65b74b8ffaedfc0fc4e233684c89eaa4a2f36c4fe478a3d851991b32e5950
-
SHA512
adffec8a1940113c1a7545a8778fc77db1f9bf6f0a4f216f96bef5ea9197831e3821d4f5b822e08fcc15477a3650ab60dd88814008b85db56b27f5c624c0eb7d
-
SSDEEP
12288:XYkc9t2Sll/Sq9x4oWrSfzTw9wViWOfo1l9ds/7NPq7:XYkcL5Sq/4jurIGOfobvkNPq7
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4268 keygen.exe -
Loads dropped DLL 3 IoCs
pid Process 4268 keygen.exe 4268 keygen.exe 4268 keygen.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 4396 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4396 AUDIODG.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3516 wrote to memory of 4268 3516 Xfer_KeyGen.exe 82 PID 3516 wrote to memory of 4268 3516 Xfer_KeyGen.exe 82 PID 3516 wrote to memory of 4268 3516 Xfer_KeyGen.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\Xfer_KeyGen.exe"C:\Users\Admin\AppData\Local\Temp\Xfer_KeyGen.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Users\Admin\AppData\Local\Temp\keygen.exeC:\Users\Admin\AppData\Local\Temp\keygen.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4268
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2f8 0x2ec1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4396
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD5e4ec57e8508c5c4040383ebe6d367928
SHA1b22bcce36d9fdeae8ab7a7ecc0b01c8176648d06
SHA2568ad9e47693e292f381da42ddc13724a3063040e51c26f4ca8e1f8e2f1ddd547f
SHA51277d5cf66caf06e192e668fae2b2594e60a498e8e0ccef5b09b9710721a4cdb0c852d00c446fd32c5b5c85e739de2e73cb1f1f6044879fe7d237341bbb6f27822
-
Filesize
3KB
MD5fb235a312dbde4daf45aa6d62923d2c4
SHA167580595f059640b974cd585b3deac25aba5928e
SHA256fb2ef28d03f1bbc60cb564cc8d90b3469f3ad393d81020b4afe2501c1b60da9c
SHA51214c7ba743221520753266119b4f91023321fdead7e3f941e4c6ede1b439886fcdfe7565eefd00d03f7c93686234ccd7369e150f2ad344d365ed0447c6aa6f898
-
Filesize
459KB
MD527bb415f94ed6f7bbbe60147e256d806
SHA1311558f88abe5095c46641368982f1effc8dabc5
SHA25609eb0d54924d998add82d73ba86350ac09c1f5714d895e08c77f34441da1c2c3
SHA512161dbae65d5ef4f2bbb4c57fa18c72b3c2b2a5993bc763d673832899eaa3d120697d4192362d2270e0d9630b0dc9429b3e221bb44cf0ff59de46e949d2a4cc70
-
Filesize
249KB
MD539940bef79a1d23adf86979d4d4cceed
SHA1593f9ea0cd0c1c4ec35c92a4473ed05437fb22ce
SHA256941267a1bd1328f21bbaf3a1ba5abe12196c3d57e4c49134c6764e7b143767d8
SHA51212b8f61bb8c1c661d7d4c7aff5e2e3f2915cd1b3c923bf9b17dd3bcc8b3ffb4145aa86b284bedd2695c6e62117cc1257a896dfe3227961deac35e8e9836d12c3