Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/06/2024, 02:21

General

  • Target

    563ca131a21ed75620f5e6874a180e20.exe

  • Size

    31KB

  • MD5

    563ca131a21ed75620f5e6874a180e20

  • SHA1

    9fd5685f16bbac96f671a4a9d53217aab485fd92

  • SHA256

    684d7931efcf8cbeb69602aec6806d5f4fd2ff76518be11cb9b91f41318de3a1

  • SHA512

    74733876dcce9c347f01c37d9fb1120511c7478e5a99dbe39201e672f9977fa04d67d9c216f95049da68384390a07a5ba3f4920c0bdd7a9d73fb05e6346ab5b7

  • SSDEEP

    768:PVEHJqjHyGvwFylDpulVSQJrE/2QmlCYZUTyn838d0o0:PH2nylslwHCCL

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Modifies system executable filetype association 2 TTPs 5 IoCs
  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\563ca131a21ed75620f5e6874a180e20.exe
    "C:\Users\Admin\AppData\Local\Temp\563ca131a21ed75620f5e6874a180e20.exe"
    1⤵
    • Modifies system executable filetype association
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4848
    • C:\Windows\system\rundll32.exe
      C:\Windows\system\rundll32.exe
      2⤵
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:1492

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\notepad¢¬.exe

    Filesize

    28KB

    MD5

    1e8bb7e04681b709db4412f87cc0d51b

    SHA1

    f060bdad7f9b87f3e216e4627afb74fd8e62a842

    SHA256

    b56dab9110348217c94ea36de79652a4371d812a73eb1d7aae22d74ec1123235

    SHA512

    4367c701a5dc10be2b2dfaadab4aa2f3a2b23cdccc601415249a4393e8bd3eeabe016f4dd03f540d2a1879d93267f36db88d65717c1dbfed7c1ed7443379f064

  • C:\Windows\System\rundll32.exe

    Filesize

    31KB

    MD5

    b6dfc458abfa3952353ba390334fe62b

    SHA1

    401c626f1bcc2694707016f981af880d278164f9

    SHA256

    6a61f7491a8a3c4dce99d3f8d862a83f9cab752042f455f4af3e44d2d645180a

    SHA512

    ac1aa1c8a76f27658e6ec8c49143c698787824237e501c3f6dbeaefeac525eb72509b1c2ea6fb4b358b859468c36be49daef72300f961258c750aca9fc9bcfa6

  • memory/1492-22-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/1492-21-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/1492-28-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/1492-15-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/1492-16-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/1492-17-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/1492-18-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/1492-19-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/1492-20-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/1492-13-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/1492-27-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/1492-23-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/1492-24-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/1492-25-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/1492-26-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/4848-0-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/4848-14-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB