Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
31/05/2024, 06:32
Static task
static1
Behavioral task
behavioral1
Sample
ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe
Resource
win10v2004-20240508-en
General
-
Target
ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe
-
Size
77KB
-
MD5
f5997e9fa0254777e5ed3f63915054cf
-
SHA1
1cd03573fb15e9d687a5c3befd099ff4739fac1f
-
SHA256
ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335
-
SHA512
98c105e0632848d86b972260aeffa1d4624d2efaa309c2da66fd4d2a0fb7df4b4cb15784152c088f15dc3c782bdd3fb9b95088262afb17483d580c0c5099b07b
-
SSDEEP
1536:RshfSWHHNvoLqNwDDGw02eQmh0HjWO6Zi:GhfxHNIreQm+Hi5Zi
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2360 rundll32.exe -
Modifies system executable filetype association 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\notepad¢¬.exe ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe File opened for modification C:\Windows\SysWOW64\¢«.exe ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe File created C:\Windows\SysWOW64\¢«.exe ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe File opened for modification C:\Windows\SysWOW64\notepad¢¬.exe ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system\rundll32.exe ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe File created C:\Windows\system\rundll32.exe ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainSetup = "1717137140" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad.exe %1" ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainUp = "1717137140" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainVer = "506" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 4980 ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe 4980 ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe 4980 ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe 4980 ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe 4980 ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe 4980 ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe 4980 ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe 4980 ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe 4980 ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe 4980 ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe 4980 ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe 4980 ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe 4980 ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe 4980 ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe 4980 ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe 4980 ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe 4980 ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe 4980 ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe 4980 ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe 4980 ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe 4980 ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe 4980 ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe 4980 ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe 4980 ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe 4980 ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe 4980 ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe 4980 ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe 4980 ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2360 rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4980 ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe 2360 rundll32.exe 2360 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4980 wrote to memory of 2360 4980 ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe 85 PID 4980 wrote to memory of 2360 4980 ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe 85 PID 4980 wrote to memory of 2360 4980 ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe"C:\Users\Admin\AppData\Local\Temp\ae40d0b175870a11adb1fa3d9ec17ce6edd3e2daef5afa1202d8bef7d08cc335.exe"1⤵
- Modifies system executable filetype association
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Windows\system\rundll32.exeC:\Windows\system\rundll32.exe2⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2360
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD594e1c89f26d47fbc4148084d3ecad0f2
SHA1df45c12874a1a58f60640c5bd636939c19e802bc
SHA25687165a41f5640cd20d45eb3b8078fe36bc84fab7c9cf0f0a964722fd9f9ab843
SHA512e24169148f9c6e955b92708f91936e8424c0b8e502e9696a8a2aad1abab1cd5c80e5c50ee7daca80853af212c4c2a4e83c9afa28e3cfd82b8b71844e5174e62b
-
Filesize
77KB
MD553c37bebabc96e0821b9e27b0909b0af
SHA11c7c29c7afe85817aefb7904af680b1ca94fc627
SHA256dcca3c60b40ba3588dd177534f592f79dea3b91b506208aa67013f1f40c4c56a
SHA5126f2d18513e4658c29f334edb45a4fc5e21084ffb353bd4d45fb9ec8e613e6b837f9e806165b3eb1bd595156b61b9eaa2950a679cc6308fe5a48dbcc4f0cd6e26