Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
52s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24/06/2024, 21:23
Behavioral task
behavioral1
Sample
4faf38dc2c68fb994cde73c30ccc463ed8a035089bbf8a17c444a8f0b500607d.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
4faf38dc2c68fb994cde73c30ccc463ed8a035089bbf8a17c444a8f0b500607d.exe
Resource
win10v2004-20240508-en
General
-
Target
4faf38dc2c68fb994cde73c30ccc463ed8a035089bbf8a17c444a8f0b500607d.exe
-
Size
134KB
-
MD5
c3340367f47927c4bcc4977a7e3b72a9
-
SHA1
e06bb4c6025c0765b73a21e764d056d04646c24b
-
SHA256
4faf38dc2c68fb994cde73c30ccc463ed8a035089bbf8a17c444a8f0b500607d
-
SHA512
7fa74a52d144c1432b84acae96a4a57b6c8be137db0fa2c13afd446abf1d91ec3580929275dadf865bde866b1b422a410fa0d8692630888c317da89b71f2db69
-
SSDEEP
1536:rF0AJELopHG9aa+9qX3apJzAKWYr0v7ioy6paK2AZqMIK7aGZh38Q1:riAyLN9aa+9U2rW1ip6pr2At7NZuQ1
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 5 IoCs
resource yara_rule behavioral2/memory/2148-0-0x0000000000910000-0x0000000000938000-memory.dmp UPX behavioral2/memory/2408-4-0x0000000000300000-0x0000000000328000-memory.dmp UPX behavioral2/files/0x000800000002340c-3.dat UPX behavioral2/memory/2148-6-0x0000000000910000-0x0000000000938000-memory.dmp UPX behavioral2/memory/2408-7-0x0000000000300000-0x0000000000328000-memory.dmp UPX -
Executes dropped EXE 1 IoCs
pid Process 2408 WwanSvc.exe -
resource yara_rule behavioral2/memory/2148-0-0x0000000000910000-0x0000000000938000-memory.dmp upx behavioral2/memory/2408-4-0x0000000000300000-0x0000000000328000-memory.dmp upx behavioral2/files/0x000800000002340c-3.dat upx behavioral2/memory/2148-6-0x0000000000910000-0x0000000000938000-memory.dmp upx behavioral2/memory/2408-7-0x0000000000300000-0x0000000000328000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Window Update = "\"C:\\ProgramData\\Update\\WwanSvc.exe\" /run" 4faf38dc2c68fb994cde73c30ccc463ed8a035089bbf8a17c444a8f0b500607d.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2148 wrote to memory of 2408 2148 4faf38dc2c68fb994cde73c30ccc463ed8a035089bbf8a17c444a8f0b500607d.exe 80 PID 2148 wrote to memory of 2408 2148 4faf38dc2c68fb994cde73c30ccc463ed8a035089bbf8a17c444a8f0b500607d.exe 80 PID 2148 wrote to memory of 2408 2148 4faf38dc2c68fb994cde73c30ccc463ed8a035089bbf8a17c444a8f0b500607d.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\4faf38dc2c68fb994cde73c30ccc463ed8a035089bbf8a17c444a8f0b500607d.exe"C:\Users\Admin\AppData\Local\Temp\4faf38dc2c68fb994cde73c30ccc463ed8a035089bbf8a17c444a8f0b500607d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\ProgramData\Update\WwanSvc.exe"C:\ProgramData\Update\WwanSvc.exe" /run2⤵
- Executes dropped EXE
PID:2408
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD5b8314adf0b4577a68e9821917bb9f4c2
SHA1d98e1d589f7477084421f6c522bf4a74e404144c
SHA256050bc77541c49cd9eea0d07e8393e22132be7770843301c31e2ed93204bcd558
SHA5126ba1e5e902d7b80af3a82b2533014b8a5672d6ae47bb88ac5699e5bb932543e13ca1091624a66bc239ec749bfb8d97dc3a34ed4cce3577df316b6ec04248f5da