Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
171s -
max time network
179s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27/06/2024, 22:49
Static task
static1
Behavioral task
behavioral1
Sample
5cdba561b164c4fa4e931cc251a7dcf46c36feb9258e6097c6ec427cea837c6c.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
5cdba561b164c4fa4e931cc251a7dcf46c36feb9258e6097c6ec427cea837c6c.exe
Resource
win11-20240508-en
General
-
Target
5cdba561b164c4fa4e931cc251a7dcf46c36feb9258e6097c6ec427cea837c6c.exe
-
Size
4.9MB
-
MD5
e5367392dcd72e44e6fad7aa7abed64c
-
SHA1
316a7bc9f17bc04bb372e5168f13cc9e411d8361
-
SHA256
5cdba561b164c4fa4e931cc251a7dcf46c36feb9258e6097c6ec427cea837c6c
-
SHA512
813deda97075ed63f6c8d6e227f3458553c5daca41065d293b569674ec661cd2ac139350b87ed9949708127df901588397492224755158fa00fad7ca6557fa8a
-
SSDEEP
98304:CGfMq2ecBZOVd9ovD/59VmvRYpzkPXXNpokg1s4IYnUviFkBCWFrNEyLFQxcMv:fLaBodivxGYpzkvXN2vSgnkiF0NXQW8
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1788 5cdba561b164c4fa4e931cc251a7dcf46c36feb9258e6097c6ec427cea837c6c.tmp 1612 wavmp3splitter32.exe 732 wavmp3splitter32.exe -
Loads dropped DLL 1 IoCs
pid Process 1788 5cdba561b164c4fa4e931cc251a7dcf46c36feb9258e6097c6ec427cea837c6c.tmp -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1788 5cdba561b164c4fa4e931cc251a7dcf46c36feb9258e6097c6ec427cea837c6c.tmp -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1528 wrote to memory of 1788 1528 5cdba561b164c4fa4e931cc251a7dcf46c36feb9258e6097c6ec427cea837c6c.exe 94 PID 1528 wrote to memory of 1788 1528 5cdba561b164c4fa4e931cc251a7dcf46c36feb9258e6097c6ec427cea837c6c.exe 94 PID 1528 wrote to memory of 1788 1528 5cdba561b164c4fa4e931cc251a7dcf46c36feb9258e6097c6ec427cea837c6c.exe 94 PID 1788 wrote to memory of 1612 1788 5cdba561b164c4fa4e931cc251a7dcf46c36feb9258e6097c6ec427cea837c6c.tmp 103 PID 1788 wrote to memory of 1612 1788 5cdba561b164c4fa4e931cc251a7dcf46c36feb9258e6097c6ec427cea837c6c.tmp 103 PID 1788 wrote to memory of 1612 1788 5cdba561b164c4fa4e931cc251a7dcf46c36feb9258e6097c6ec427cea837c6c.tmp 103 PID 1788 wrote to memory of 732 1788 5cdba561b164c4fa4e931cc251a7dcf46c36feb9258e6097c6ec427cea837c6c.tmp 104 PID 1788 wrote to memory of 732 1788 5cdba561b164c4fa4e931cc251a7dcf46c36feb9258e6097c6ec427cea837c6c.tmp 104 PID 1788 wrote to memory of 732 1788 5cdba561b164c4fa4e931cc251a7dcf46c36feb9258e6097c6ec427cea837c6c.tmp 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\5cdba561b164c4fa4e931cc251a7dcf46c36feb9258e6097c6ec427cea837c6c.exe"C:\Users\Admin\AppData\Local\Temp\5cdba561b164c4fa4e931cc251a7dcf46c36feb9258e6097c6ec427cea837c6c.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\is-G76RM.tmp\5cdba561b164c4fa4e931cc251a7dcf46c36feb9258e6097c6ec427cea837c6c.tmp"C:\Users\Admin\AppData\Local\Temp\is-G76RM.tmp\5cdba561b164c4fa4e931cc251a7dcf46c36feb9258e6097c6ec427cea837c6c.tmp" /SL5="$60178,4931479,54272,C:\Users\Admin\AppData\Local\Temp\5cdba561b164c4fa4e931cc251a7dcf46c36feb9258e6097c6ec427cea837c6c.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Users\Admin\AppData\Local\Direct WAV MP3 Splitter\wavmp3splitter32.exe"C:\Users\Admin\AppData\Local\Direct WAV MP3 Splitter\wavmp3splitter32.exe" -i3⤵
- Executes dropped EXE
PID:1612
-
-
C:\Users\Admin\AppData\Local\Direct WAV MP3 Splitter\wavmp3splitter32.exe"C:\Users\Admin\AppData\Local\Direct WAV MP3 Splitter\wavmp3splitter32.exe" -s3⤵
- Executes dropped EXE
PID:732
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1408 --field-trial-handle=2744,i,16362475727591565961,3676688664819797550,262144 --variations-seed-version /prefetch:81⤵PID:372
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.4MB
MD5ca5425428664c81b4873dcf3c9ff31ae
SHA1e1a1ee6e6c83f8d66ca7a421b41632620d60b4a4
SHA25665b7624f9700719b2e1dfd98beb37897ac6d66a9e3fd3955dd4162826171f762
SHA512213d937d901ace1186575d85025dbf7874b430d489c47ae33a7d2e6594df78fc50624835ca4a1b06c6984615b6e785d7f6ac013f2bd740482d4bcee1f825d86c
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
C:\Users\Admin\AppData\Local\Temp\is-G76RM.tmp\5cdba561b164c4fa4e931cc251a7dcf46c36feb9258e6097c6ec427cea837c6c.tmp
Filesize680KB
MD559177ea3e8147d91b694e9949c60d194
SHA15c8cfd3fcccd7be056c7c0e2e4fc063c38dc14bd
SHA2569687ab4b33b1a083194713be5a0f872ebb949773b832a20063a507073859e28c
SHA512a235dab7d5dc6652f5f8256c1e2c19aef2f583ead02a920ee17658eeb64e8a9620767594d7e4b6ca4aa030643821133c1a18823c55ea769d3221383927ea8a08