Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
91s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
05/06/2024, 02:33
Static task
static1
Behavioral task
behavioral1
Sample
fed789b6353a0b47856963869cd0730729e72b21c08ab54ad7d4bec4f38d3da8.exe
Resource
win7-20240221-en
General
-
Target
fed789b6353a0b47856963869cd0730729e72b21c08ab54ad7d4bec4f38d3da8.exe
-
Size
181KB
-
MD5
6de76e8f46ff46803268219774e5de41
-
SHA1
d553c8ca4f4d9dbcc048fbe586679e53c9bc7bd7
-
SHA256
fed789b6353a0b47856963869cd0730729e72b21c08ab54ad7d4bec4f38d3da8
-
SHA512
8978687cbcf20408baae6f588595f1c58f0baf5976cf7c269987e6ed3a6309e841d8621c08c1efbfd2c3aecfc73c06a6d453463e09f601c73f3f0986b9adf262
-
SSDEEP
3072:HCmlA+2TGMF85+bkRG32foUP9GmPe97Uoduqn+HaxAdbAqR/gTDTdJip9NZ:imlV4h8JG3QUzduqn+HaGdbD/Mf+/NZ
Malware Config
Extracted
koiloader
http://45.86.162.187/overapplaud.php
-
payload_url
https://www.crowcrm.eu/adserver/docs/images
Signatures
-
Detects KoiLoader payload 1 IoCs
resource yara_rule behavioral2/memory/4788-0-0x0000000000F40000-0x0000000000F4D000-memory.dmp family_koi_loader -
Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) 1 IoCs
resource yara_rule behavioral2/memory/4788-0-0x0000000000F40000-0x0000000000F4D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM