Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
0s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
08/06/2024, 13:52
Static task
static1
Behavioral task
behavioral1
Sample
spin3d.exe
Resource
win11-20240508-en
General
-
Target
spin3d.exe
-
Size
1.1MB
-
MD5
63b9c30a09149de7ff633a4a2a18b715
-
SHA1
9a881b080d68539e5a80e49443028d2be01288d7
-
SHA256
f2402c9091301362f4373772f43a917926f018b11c2528f906fb65a686f208f5
-
SHA512
76d5cc1b082e2428e7b9cbc0a3bf0ef0840a4c60ce133a9d950e2b83038b091364893c5baeebe4e81f338d0a411eba58279661ed5e568f1d7e575013550dd5a7
-
SSDEEP
24576:nr6qh5TZtmp3ocu0IHxQGUYrPliBYF6tfpAIQfXSXNwcZ:rnzTmA+Yb+YMXArfSqU
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2457560273-69882387-977367775-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Spin3DInstall = "C:\\Users\\Admin\\AppData\\Local\\Temp\\spin3d.exe" nchsetup.exe -
Executes dropped EXE 1 IoCs
pid Process 2808 nchsetup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1216 wrote to memory of 2808 1216 spin3d.exe 77 PID 1216 wrote to memory of 2808 1216 spin3d.exe 77 PID 1216 wrote to memory of 2808 1216 spin3d.exe 77
Processes
-
C:\Users\Admin\AppData\Local\Temp\spin3d.exe"C:\Users\Admin\AppData\Local\Temp\spin3d.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\n1s\nchsetup.exe"C:\Users\Admin\AppData\Local\Temp\n1s\nchsetup.exe" -installer "C:\Users\Admin\AppData\Local\Temp\spin3d.exe" -instdata "C:\Users\Admin\AppData\Local\Temp\n1s\nchdata.dat"2⤵
- Adds Run key to start application
- Executes dropped EXE
PID:2808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD534dea0830f87ef51c0011e297de00384
SHA16d1d42419863eb571565f912be26d2b27d55a013
SHA256b25dcd24e73c09e204c0c8e9a7ac4e094a4a6378db7af6ba38a5038b1a435bb7
SHA512c08e1dcc28c0a0e79c850fbe3ba565b203080aa6de661af622aa3bca641804f700354c66d2751609fff7e92195bba876213d8d37c1cbebbeacaca5dc4d1cc1d4