Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21/05/2024, 15:20
Static task
static1
Behavioral task
behavioral1
Sample
PI_20052024.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
PI_20052024.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240226-en
General
-
Target
PI_20052024.exe
-
Size
568KB
-
MD5
e4370a31c71c37bde2e16022fa0459c2
-
SHA1
10890db50f2aac0931eec94f45e012944efed869
-
SHA256
49ffcfe176de375dbbb2e4d50043d80fa254ca6b4ffc6d18d9501b6d8841a436
-
SHA512
1454935b456d4fc26b978fb4a38ec34ba673ba27ccc23c9d73328441cbdfd78baade7173eefbd2d51ffa42cd8e20697521d0128f4f08b1800293c613ac60d5af
-
SSDEEP
12288:mH7MMIqb9BaBUbdD4aPHb2XR+MAghog0RdBBplW8Lmy:+7a69BWUhD3Ha+MPCXtlW8Lmy
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 4536 powershell.exe -
Loads dropped DLL 2 IoCs
pid Process 4552 PI_20052024.exe 4552 PI_20052024.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 5088 4536 WerFault.exe 85 -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 4536 powershell.exe 4536 powershell.exe 4536 powershell.exe 4536 powershell.exe 4536 powershell.exe 4536 powershell.exe 4536 powershell.exe 4536 powershell.exe 4536 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4536 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4552 wrote to memory of 4536 4552 PI_20052024.exe 85 PID 4552 wrote to memory of 4536 4552 PI_20052024.exe 85 PID 4552 wrote to memory of 4536 4552 PI_20052024.exe 85 PID 4536 wrote to memory of 4092 4536 powershell.exe 90 PID 4536 wrote to memory of 4092 4536 powershell.exe 90 PID 4536 wrote to memory of 4092 4536 powershell.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\PI_20052024.exe"C:\Users\Admin\AppData\Local\Temp\PI_20052024.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle hidden "$Gadgetries=Get-Content 'C:\Users\Admin\AppData\Local\nondefence\kledyrenes\mesoblastema\Kahlil\Sheriffess.Sal';$Underpricing=$Gadgetries.SubString(522,3);.$Underpricing($Gadgetries)"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" "/c set /A 1^^0"3⤵PID:4092
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4536 -s 27443⤵
- Program crash
PID:5088
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 372 -p 4536 -ip 45361⤵PID:3676
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
9KB
MD51c8b2b40c642e8b5a5b3ff102796fb37
SHA13245f55afac50f775eb53fd6d14abb7fe523393d
SHA2568780095aa2f49725388cddf00d79a74e85c9c4863b366f55c39c606a5fb8440c
SHA5124ff2dc83f640933162ec8818bb1bf3b3be1183264750946a3d949d2e7068ee606277b6c840193ef2b4663952387f07f6ab12c84c4a11cae9a8de7bd4e7971c57
-
Filesize
50KB
MD5197064b3c1ff1c585db3f2a0b7c2c44a
SHA1f66e3acf12f2c5c120923519ec806c0eb3b40c6d
SHA256c2a25450b4800c19f49a02faaf3d4d549c6ddef5c8632621fc69b3fe4c3efbd6
SHA5124e17845a8a7dcd40e1aa929cd9ca9158b635aff3b2e188c28eb533c660eab6aef1ccd872c417c12b10127788e118ac17f5c6a2aad628a2de5596fe4cced58670
-
Filesize
910B
MD53574320d2c35e9614bc32e0c491af8c0
SHA1834c3686673ad12a1f5e0b3e0005adbecd8b53c8
SHA25616dd6000b6073fa3eb28a7f180ee4dd9a2125555d9c27d8d0f83ebcba53325a6
SHA512fc5600ff51a211e617fc530323a68b0cb5ac25a955fe45f427782cedea86d0d3169ee822fa6e8cc5c1c42a4c7b0aeb3f55f12fc2f624338139f2d02e235f9197