Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
30/06/2024, 16:23
Static task
static1
Behavioral task
behavioral1
Sample
b9b0c87de0a1ca5357678f34d9ea61a946f5711d01950913309a8ddbfd01536b.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
b9b0c87de0a1ca5357678f34d9ea61a946f5711d01950913309a8ddbfd01536b.exe
Resource
win10v2004-20240611-en
General
-
Target
b9b0c87de0a1ca5357678f34d9ea61a946f5711d01950913309a8ddbfd01536b.exe
-
Size
15.0MB
-
MD5
f49193176f6ba96ce98c927ea6ffc105
-
SHA1
af91915ab0a73665e2e4b4dbf03536825bc99916
-
SHA256
b9b0c87de0a1ca5357678f34d9ea61a946f5711d01950913309a8ddbfd01536b
-
SHA512
ec7f8b197af0932bfd0e11166bd8728bdfc9a327871807a1607eb983db3aa6365b60d29b9cf2504263a586c6a57af3ef61822ad67c0db7e28db04cbb1a9deae2
-
SSDEEP
196608:AzwoVmUuCvh7pQoXhQET1AIx53YJbaogxWVmw+pLFKc:oVmUuy7p7XhN5VIHgkVmwYLFT
Malware Config
Signatures
-
Loads dropped DLL 4 IoCs
pid Process 4400 b9b0c87de0a1ca5357678f34d9ea61a946f5711d01950913309a8ddbfd01536b.exe 4400 b9b0c87de0a1ca5357678f34d9ea61a946f5711d01950913309a8ddbfd01536b.exe 1616 b9b0c87de0a1ca5357678f34d9ea61a946f5711d01950913309a8ddbfd01536b.exe 1616 b9b0c87de0a1ca5357678f34d9ea61a946f5711d01950913309a8ddbfd01536b.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Fonts\font_temp.ttf b9b0c87de0a1ca5357678f34d9ea61a946f5711d01950913309a8ddbfd01536b.exe File opened for modification C:\Windows\Fonts\font_temp.ttf b9b0c87de0a1ca5357678f34d9ea61a946f5711d01950913309a8ddbfd01536b.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4436 PING.EXE -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4400 b9b0c87de0a1ca5357678f34d9ea61a946f5711d01950913309a8ddbfd01536b.exe 4400 b9b0c87de0a1ca5357678f34d9ea61a946f5711d01950913309a8ddbfd01536b.exe 1616 b9b0c87de0a1ca5357678f34d9ea61a946f5711d01950913309a8ddbfd01536b.exe 1616 b9b0c87de0a1ca5357678f34d9ea61a946f5711d01950913309a8ddbfd01536b.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4400 wrote to memory of 3676 4400 b9b0c87de0a1ca5357678f34d9ea61a946f5711d01950913309a8ddbfd01536b.exe 82 PID 4400 wrote to memory of 3676 4400 b9b0c87de0a1ca5357678f34d9ea61a946f5711d01950913309a8ddbfd01536b.exe 82 PID 4400 wrote to memory of 3676 4400 b9b0c87de0a1ca5357678f34d9ea61a946f5711d01950913309a8ddbfd01536b.exe 82 PID 3676 wrote to memory of 4436 3676 cmd.exe 84 PID 3676 wrote to memory of 4436 3676 cmd.exe 84 PID 3676 wrote to memory of 4436 3676 cmd.exe 84 PID 3676 wrote to memory of 1616 3676 cmd.exe 88 PID 3676 wrote to memory of 1616 3676 cmd.exe 88 PID 3676 wrote to memory of 1616 3676 cmd.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\b9b0c87de0a1ca5357678f34d9ea61a946f5711d01950913309a8ddbfd01536b.exe"C:\Users\Admin\AppData\Local\Temp\b9b0c87de0a1ca5357678f34d9ea61a946f5711d01950913309a8ddbfd01536b.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\Restart.bat2⤵
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 23⤵
- Runs ping.exe
PID:4436
-
-
C:\Users\Admin\AppData\Local\Temp\b9b0c87de0a1ca5357678f34d9ea61a946f5711d01950913309a8ddbfd01536b.exe"C:\Users\Admin\AppData\Local\Temp\B9B0C8~1.EXE"3⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1616
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD5a081782e61d769dcd299bb7672aed743
SHA178d4795bb43ad2b949192b09987b17eba156dced
SHA25634ece32d4bf3dab02772326afd2e5d8d1f28d7c5be6379c3d40875a03345bafa
SHA512e7384eab27e866284071709f90097db8a6bc630d5dee8b102a0f4a6b9af9a70797209bd50d00ed28899ee4628b937f44cf2eb8d5518562b3c37925ad53704ab0
-
Filesize
113B
MD51885e432430cc1d778ba290d1588ca73
SHA17866c08c1a1c0d63adf6ece2f404c176825591cc
SHA256b051ab8e9a090e5908f378a10259cabd3d3615df8f968d1a0dfe34c50ddb13e8
SHA51208af5f911a0d6665ac812a17b45b4c916ceddee31848bc3589ceff327337b59e887f11276fbf8379932dfe15fbacf455981e2f2b6ddc6b46d5671977d61901aa
-
Filesize
333KB
MD556a2bcecbd3cddd6f4a35361bf4920d6
SHA1992e63be423f0e61093ba183f49fc0cbec790488
SHA2565fcfac18758a12e0e717a5189f379922a32b5ac12f26491e638d70b54ae1dcab
SHA512473cbdf760242db1f0f1d0c27046c0564998f2bf931ad03feb28af3c7bd253d00e6f0836dadf37f29e0db4171eb64e6a15ed4cb9a9d28b48fb0aab601573f551
-
Filesize
8.0MB
MD5092a99ee52bbaef7481cc96c5b85b992
SHA106b8475f99605af9ff9ff3ed1d0eb907fd57c06b
SHA256b3f675ccfc65edd6f27432dec6639b1414e9dc627831791263a99e2d711d215d
SHA5123538cebe1c0e2439c7ba289c4420627d59b4922e26242408f114aa01d342734b057d92edac35bee7c47cb926091695efc6c560802db0cd342f75cee1f8b96baf