Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11/06/2024, 03:31
Static task
static1
Behavioral task
behavioral1
Sample
18fbe957536d2c91634bd4e0c3e78184.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
18fbe957536d2c91634bd4e0c3e78184.exe
Resource
win10v2004-20240508-en
General
-
Target
18fbe957536d2c91634bd4e0c3e78184.exe
-
Size
867KB
-
MD5
18fbe957536d2c91634bd4e0c3e78184
-
SHA1
11f49fa2008e0b43b2587772c162928f921c6295
-
SHA256
e62eca30d7718069c5092f0e9c5bb1bb8a5f0b1c1c5ea2cb99abb564dee8dadb
-
SHA512
d0977dfaf3367663c98ca45fd2a227445e870ee6b14af4d4935d2212efdcbd5e92ef5dbaa8db7de7651549b3ceda2277636cc975750dd9096b33b2a254b05211
-
SSDEEP
12288:TdzfO1wnp0a/FT+HLwap/8hjclvgNpyJegjMmIqt1eGMrs8GdkYSCrh0dq:5aGph/ows0hOvq0/SM1t8+Wuh0I
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\OLQUTY.lnk 18fbe957536d2c91634bd4e0c3e78184.exe -
Executes dropped EXE 2 IoCs
pid Process 3736 gitignore.exe 2412 gitignore.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OLQUTY = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windata\\gitignore.exe\"" 18fbe957536d2c91634bd4e0c3e78184.exe -
AutoIT Executable 12 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/3260-7-0x0000000000400000-0x00000000004D5000-memory.dmp autoit_exe behavioral2/memory/3260-9-0x0000000000400000-0x00000000004D5000-memory.dmp autoit_exe behavioral2/memory/3260-10-0x0000000000400000-0x00000000004D5000-memory.dmp autoit_exe behavioral2/memory/3736-14-0x0000000000400000-0x00000000004D5000-memory.dmp autoit_exe behavioral2/memory/3736-15-0x0000000000400000-0x00000000004D5000-memory.dmp autoit_exe behavioral2/memory/3260-17-0x0000000000400000-0x00000000004D5000-memory.dmp autoit_exe behavioral2/memory/3260-18-0x0000000000400000-0x00000000004D5000-memory.dmp autoit_exe behavioral2/memory/3260-20-0x0000000000400000-0x00000000004D5000-memory.dmp autoit_exe behavioral2/memory/3260-21-0x0000000000400000-0x00000000004D5000-memory.dmp autoit_exe behavioral2/memory/2412-25-0x0000000000400000-0x00000000004D5000-memory.dmp autoit_exe behavioral2/memory/3260-26-0x0000000000400000-0x00000000004D5000-memory.dmp autoit_exe behavioral2/memory/3260-27-0x0000000000400000-0x00000000004D5000-memory.dmp autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3668 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3260 18fbe957536d2c91634bd4e0c3e78184.exe 3260 18fbe957536d2c91634bd4e0c3e78184.exe 3260 18fbe957536d2c91634bd4e0c3e78184.exe 3260 18fbe957536d2c91634bd4e0c3e78184.exe 3260 18fbe957536d2c91634bd4e0c3e78184.exe 3260 18fbe957536d2c91634bd4e0c3e78184.exe 3260 18fbe957536d2c91634bd4e0c3e78184.exe 3260 18fbe957536d2c91634bd4e0c3e78184.exe 3260 18fbe957536d2c91634bd4e0c3e78184.exe 3260 18fbe957536d2c91634bd4e0c3e78184.exe 3260 18fbe957536d2c91634bd4e0c3e78184.exe 3260 18fbe957536d2c91634bd4e0c3e78184.exe 3260 18fbe957536d2c91634bd4e0c3e78184.exe 3260 18fbe957536d2c91634bd4e0c3e78184.exe 3260 18fbe957536d2c91634bd4e0c3e78184.exe 3260 18fbe957536d2c91634bd4e0c3e78184.exe 3260 18fbe957536d2c91634bd4e0c3e78184.exe 3260 18fbe957536d2c91634bd4e0c3e78184.exe 3260 18fbe957536d2c91634bd4e0c3e78184.exe 3260 18fbe957536d2c91634bd4e0c3e78184.exe 3260 18fbe957536d2c91634bd4e0c3e78184.exe 3260 18fbe957536d2c91634bd4e0c3e78184.exe 3260 18fbe957536d2c91634bd4e0c3e78184.exe 3260 18fbe957536d2c91634bd4e0c3e78184.exe 3260 18fbe957536d2c91634bd4e0c3e78184.exe 3260 18fbe957536d2c91634bd4e0c3e78184.exe 3260 18fbe957536d2c91634bd4e0c3e78184.exe 3260 18fbe957536d2c91634bd4e0c3e78184.exe 3260 18fbe957536d2c91634bd4e0c3e78184.exe 3260 18fbe957536d2c91634bd4e0c3e78184.exe 3260 18fbe957536d2c91634bd4e0c3e78184.exe 3260 18fbe957536d2c91634bd4e0c3e78184.exe 3260 18fbe957536d2c91634bd4e0c3e78184.exe 3260 18fbe957536d2c91634bd4e0c3e78184.exe 3260 18fbe957536d2c91634bd4e0c3e78184.exe 3260 18fbe957536d2c91634bd4e0c3e78184.exe 3260 18fbe957536d2c91634bd4e0c3e78184.exe 3260 18fbe957536d2c91634bd4e0c3e78184.exe 3260 18fbe957536d2c91634bd4e0c3e78184.exe 3260 18fbe957536d2c91634bd4e0c3e78184.exe 3260 18fbe957536d2c91634bd4e0c3e78184.exe 3260 18fbe957536d2c91634bd4e0c3e78184.exe 3260 18fbe957536d2c91634bd4e0c3e78184.exe 3260 18fbe957536d2c91634bd4e0c3e78184.exe 3260 18fbe957536d2c91634bd4e0c3e78184.exe 3260 18fbe957536d2c91634bd4e0c3e78184.exe 3260 18fbe957536d2c91634bd4e0c3e78184.exe 3260 18fbe957536d2c91634bd4e0c3e78184.exe 3260 18fbe957536d2c91634bd4e0c3e78184.exe 3260 18fbe957536d2c91634bd4e0c3e78184.exe 3260 18fbe957536d2c91634bd4e0c3e78184.exe 3260 18fbe957536d2c91634bd4e0c3e78184.exe 3260 18fbe957536d2c91634bd4e0c3e78184.exe 3260 18fbe957536d2c91634bd4e0c3e78184.exe 3260 18fbe957536d2c91634bd4e0c3e78184.exe 3260 18fbe957536d2c91634bd4e0c3e78184.exe 3260 18fbe957536d2c91634bd4e0c3e78184.exe 3260 18fbe957536d2c91634bd4e0c3e78184.exe 3260 18fbe957536d2c91634bd4e0c3e78184.exe 3260 18fbe957536d2c91634bd4e0c3e78184.exe 3260 18fbe957536d2c91634bd4e0c3e78184.exe 3260 18fbe957536d2c91634bd4e0c3e78184.exe 3260 18fbe957536d2c91634bd4e0c3e78184.exe 3260 18fbe957536d2c91634bd4e0c3e78184.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3260 18fbe957536d2c91634bd4e0c3e78184.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3260 wrote to memory of 2400 3260 18fbe957536d2c91634bd4e0c3e78184.exe 89 PID 3260 wrote to memory of 2400 3260 18fbe957536d2c91634bd4e0c3e78184.exe 89 PID 3260 wrote to memory of 2400 3260 18fbe957536d2c91634bd4e0c3e78184.exe 89 PID 3260 wrote to memory of 3488 3260 18fbe957536d2c91634bd4e0c3e78184.exe 91 PID 3260 wrote to memory of 3488 3260 18fbe957536d2c91634bd4e0c3e78184.exe 91 PID 3260 wrote to memory of 3488 3260 18fbe957536d2c91634bd4e0c3e78184.exe 91 PID 2400 wrote to memory of 3668 2400 cmd.exe 93 PID 2400 wrote to memory of 3668 2400 cmd.exe 93 PID 2400 wrote to memory of 3668 2400 cmd.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\18fbe957536d2c91634bd4e0c3e78184.exe"C:\Users\Admin\AppData\Local\Temp\18fbe957536d2c91634bd4e0c3e78184.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:3260 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn OLQUTY.exe /tr C:\Users\Admin\AppData\Roaming\Windata\gitignore.exe /sc minute /mo 12⤵
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn OLQUTY.exe /tr C:\Users\Admin\AppData\Roaming\Windata\gitignore.exe /sc minute /mo 13⤵
- Creates scheduled task(s)
PID:3668
-
-
-
C:\Windows\SysWOW64\WSCript.exeWSCript C:\Users\Admin\AppData\Local\Temp\OLQUTY.vbs2⤵PID:3488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3236,i,16488180140590516186,11762960689811837350,262144 --variations-seed-version --mojo-platform-channel-handle=1284 /prefetch:81⤵PID:2296
-
C:\Users\Admin\AppData\Roaming\Windata\gitignore.exeC:\Users\Admin\AppData\Roaming\Windata\gitignore.exe1⤵
- Executes dropped EXE
PID:3736
-
C:\Users\Admin\AppData\Roaming\Windata\gitignore.exeC:\Users\Admin\AppData\Roaming\Windata\gitignore.exe1⤵
- Executes dropped EXE
PID:2412
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
884B
MD598ee851f7a994dec9306b8dec10df8b2
SHA1bb30655a92318cd7cb68ea221c0d1a09fc5d423c
SHA256730832c257e6b61687f986e1c9c30b48765ac67ff7045bc722a83b598a603d5d
SHA512ddeb48588eb0bd57651acb8b608786a7c6448906d253e74eb3bbdf4188ea41f37029285f169f7c2206784502070a6c9aec30634e7e9466938a6d1977a8572157
-
Filesize
867KB
MD518fbe957536d2c91634bd4e0c3e78184
SHA111f49fa2008e0b43b2587772c162928f921c6295
SHA256e62eca30d7718069c5092f0e9c5bb1bb8a5f0b1c1c5ea2cb99abb564dee8dadb
SHA512d0977dfaf3367663c98ca45fd2a227445e870ee6b14af4d4935d2212efdcbd5e92ef5dbaa8db7de7651549b3ceda2277636cc975750dd9096b33b2a254b05211