Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20/06/2024, 02:21
Static task
static1
Behavioral task
behavioral1
Sample
563ca131a21ed75620f5e6874a180e20.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
563ca131a21ed75620f5e6874a180e20.exe
Resource
win10v2004-20240508-en
General
-
Target
563ca131a21ed75620f5e6874a180e20.exe
-
Size
31KB
-
MD5
563ca131a21ed75620f5e6874a180e20
-
SHA1
9fd5685f16bbac96f671a4a9d53217aab485fd92
-
SHA256
684d7931efcf8cbeb69602aec6806d5f4fd2ff76518be11cb9b91f41318de3a1
-
SHA512
74733876dcce9c347f01c37d9fb1120511c7478e5a99dbe39201e672f9977fa04d67d9c216f95049da68384390a07a5ba3f4920c0bdd7a9d73fb05e6346ab5b7
-
SSDEEP
768:PVEHJqjHyGvwFylDpulVSQJrE/2QmlCYZUTyn838d0o0:PH2nylslwHCCL
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1492 rundll32.exe -
Modifies system executable filetype association 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command 563ca131a21ed75620f5e6874a180e20.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 563ca131a21ed75620f5e6874a180e20.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" 563ca131a21ed75620f5e6874a180e20.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\¢«.exe 563ca131a21ed75620f5e6874a180e20.exe File created C:\Windows\SysWOW64\¢«.exe 563ca131a21ed75620f5e6874a180e20.exe File opened for modification C:\Windows\SysWOW64\notepad¢¬.exe 563ca131a21ed75620f5e6874a180e20.exe File created C:\Windows\SysWOW64\notepad¢¬.exe 563ca131a21ed75620f5e6874a180e20.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system\rundll32.exe 563ca131a21ed75620f5e6874a180e20.exe File created C:\Windows\system\rundll32.exe 563ca131a21ed75620f5e6874a180e20.exe -
Modifies registry class 15 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" 563ca131a21ed75620f5e6874a180e20.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv 563ca131a21ed75620f5e6874a180e20.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command 563ca131a21ed75620f5e6874a180e20.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command 563ca131a21ed75620f5e6874a180e20.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainUp = "1718850065" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" 563ca131a21ed75620f5e6874a180e20.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainSetup = "1718850065" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainVer = "506" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 563ca131a21ed75620f5e6874a180e20.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad.exe %1" 563ca131a21ed75620f5e6874a180e20.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 4848 563ca131a21ed75620f5e6874a180e20.exe 4848 563ca131a21ed75620f5e6874a180e20.exe 4848 563ca131a21ed75620f5e6874a180e20.exe 4848 563ca131a21ed75620f5e6874a180e20.exe 4848 563ca131a21ed75620f5e6874a180e20.exe 4848 563ca131a21ed75620f5e6874a180e20.exe 4848 563ca131a21ed75620f5e6874a180e20.exe 4848 563ca131a21ed75620f5e6874a180e20.exe 4848 563ca131a21ed75620f5e6874a180e20.exe 4848 563ca131a21ed75620f5e6874a180e20.exe 4848 563ca131a21ed75620f5e6874a180e20.exe 4848 563ca131a21ed75620f5e6874a180e20.exe 4848 563ca131a21ed75620f5e6874a180e20.exe 4848 563ca131a21ed75620f5e6874a180e20.exe 4848 563ca131a21ed75620f5e6874a180e20.exe 4848 563ca131a21ed75620f5e6874a180e20.exe 4848 563ca131a21ed75620f5e6874a180e20.exe 4848 563ca131a21ed75620f5e6874a180e20.exe 4848 563ca131a21ed75620f5e6874a180e20.exe 4848 563ca131a21ed75620f5e6874a180e20.exe 4848 563ca131a21ed75620f5e6874a180e20.exe 4848 563ca131a21ed75620f5e6874a180e20.exe 4848 563ca131a21ed75620f5e6874a180e20.exe 4848 563ca131a21ed75620f5e6874a180e20.exe 4848 563ca131a21ed75620f5e6874a180e20.exe 4848 563ca131a21ed75620f5e6874a180e20.exe 4848 563ca131a21ed75620f5e6874a180e20.exe 4848 563ca131a21ed75620f5e6874a180e20.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1492 rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4848 563ca131a21ed75620f5e6874a180e20.exe 1492 rundll32.exe 1492 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4848 wrote to memory of 1492 4848 563ca131a21ed75620f5e6874a180e20.exe 83 PID 4848 wrote to memory of 1492 4848 563ca131a21ed75620f5e6874a180e20.exe 83 PID 4848 wrote to memory of 1492 4848 563ca131a21ed75620f5e6874a180e20.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\563ca131a21ed75620f5e6874a180e20.exe"C:\Users\Admin\AppData\Local\Temp\563ca131a21ed75620f5e6874a180e20.exe"1⤵
- Modifies system executable filetype association
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Windows\system\rundll32.exeC:\Windows\system\rundll32.exe2⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1492
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD51e8bb7e04681b709db4412f87cc0d51b
SHA1f060bdad7f9b87f3e216e4627afb74fd8e62a842
SHA256b56dab9110348217c94ea36de79652a4371d812a73eb1d7aae22d74ec1123235
SHA5124367c701a5dc10be2b2dfaadab4aa2f3a2b23cdccc601415249a4393e8bd3eeabe016f4dd03f540d2a1879d93267f36db88d65717c1dbfed7c1ed7443379f064
-
Filesize
31KB
MD5b6dfc458abfa3952353ba390334fe62b
SHA1401c626f1bcc2694707016f981af880d278164f9
SHA2566a61f7491a8a3c4dce99d3f8d862a83f9cab752042f455f4af3e44d2d645180a
SHA512ac1aa1c8a76f27658e6ec8c49143c698787824237e501c3f6dbeaefeac525eb72509b1c2ea6fb4b358b859468c36be49daef72300f961258c750aca9fc9bcfa6