Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
01/07/2024, 05:22
Static task
static1
Behavioral task
behavioral1
Sample
5d2eaaa35360b5d1f0afc080ce21aa50da7c9effd6dc6184f8f35a4c6becaab6.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
5d2eaaa35360b5d1f0afc080ce21aa50da7c9effd6dc6184f8f35a4c6becaab6.exe
Resource
win10v2004-20240611-en
General
-
Target
5d2eaaa35360b5d1f0afc080ce21aa50da7c9effd6dc6184f8f35a4c6becaab6.exe
-
Size
8.6MB
-
MD5
214f80d49bb436a6aad7b5c684d069b9
-
SHA1
73fe4c7e83fcc1d2666fe2059c25aa380c074622
-
SHA256
5d2eaaa35360b5d1f0afc080ce21aa50da7c9effd6dc6184f8f35a4c6becaab6
-
SHA512
17ff1e2f8973f95ee092c15704afe5acca2dab61483935187ceb8b072916e99371c0b594240a151376b6b87fa4f3b8f2caf4978056b90c73cfc0424176308a85
-
SSDEEP
98304:J8bAz4y9gQfS2Kqn4CnLEslfYexusOK8gyo4q8P8SkCdyn21PlrdaXX:aNegQ2G4CnLE27ue8Fo4q8Fk21PO
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1020 aria2c.exe -
resource yara_rule behavioral2/memory/4472-9-0x0000000007750000-0x00000000077E7000-memory.dmp upx behavioral2/memory/4472-8-0x0000000007750000-0x00000000077E7000-memory.dmp upx behavioral2/memory/4472-33-0x0000000007750000-0x00000000077E7000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 4472 5d2eaaa35360b5d1f0afc080ce21aa50da7c9effd6dc6184f8f35a4c6becaab6.exe 4472 5d2eaaa35360b5d1f0afc080ce21aa50da7c9effd6dc6184f8f35a4c6becaab6.exe 4472 5d2eaaa35360b5d1f0afc080ce21aa50da7c9effd6dc6184f8f35a4c6becaab6.exe 4472 5d2eaaa35360b5d1f0afc080ce21aa50da7c9effd6dc6184f8f35a4c6becaab6.exe 4472 5d2eaaa35360b5d1f0afc080ce21aa50da7c9effd6dc6184f8f35a4c6becaab6.exe 4472 5d2eaaa35360b5d1f0afc080ce21aa50da7c9effd6dc6184f8f35a4c6becaab6.exe 4472 5d2eaaa35360b5d1f0afc080ce21aa50da7c9effd6dc6184f8f35a4c6becaab6.exe 4472 5d2eaaa35360b5d1f0afc080ce21aa50da7c9effd6dc6184f8f35a4c6becaab6.exe 4472 5d2eaaa35360b5d1f0afc080ce21aa50da7c9effd6dc6184f8f35a4c6becaab6.exe 4472 5d2eaaa35360b5d1f0afc080ce21aa50da7c9effd6dc6184f8f35a4c6becaab6.exe 4472 5d2eaaa35360b5d1f0afc080ce21aa50da7c9effd6dc6184f8f35a4c6becaab6.exe 4472 5d2eaaa35360b5d1f0afc080ce21aa50da7c9effd6dc6184f8f35a4c6becaab6.exe 4472 5d2eaaa35360b5d1f0afc080ce21aa50da7c9effd6dc6184f8f35a4c6becaab6.exe 4472 5d2eaaa35360b5d1f0afc080ce21aa50da7c9effd6dc6184f8f35a4c6becaab6.exe 4472 5d2eaaa35360b5d1f0afc080ce21aa50da7c9effd6dc6184f8f35a4c6becaab6.exe 4472 5d2eaaa35360b5d1f0afc080ce21aa50da7c9effd6dc6184f8f35a4c6becaab6.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4472 5d2eaaa35360b5d1f0afc080ce21aa50da7c9effd6dc6184f8f35a4c6becaab6.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4472 5d2eaaa35360b5d1f0afc080ce21aa50da7c9effd6dc6184f8f35a4c6becaab6.exe 4472 5d2eaaa35360b5d1f0afc080ce21aa50da7c9effd6dc6184f8f35a4c6becaab6.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4472 wrote to memory of 1020 4472 5d2eaaa35360b5d1f0afc080ce21aa50da7c9effd6dc6184f8f35a4c6becaab6.exe 88 PID 4472 wrote to memory of 1020 4472 5d2eaaa35360b5d1f0afc080ce21aa50da7c9effd6dc6184f8f35a4c6becaab6.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\5d2eaaa35360b5d1f0afc080ce21aa50da7c9effd6dc6184f8f35a4c6becaab6.exe"C:\Users\Admin\AppData\Local\Temp\5d2eaaa35360b5d1f0afc080ce21aa50da7c9effd6dc6184f8f35a4c6becaab6.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Users\Admin\AppData\Local\Temp\aria2c.exe--check-certificate=false --disable-ipv6=true --enable-rpc=true --quiet=true --rpc-allow-origin-all=true --rpc-listen-all=true --rpc-listen-port=7111 --rpc-secret=DOWNLOAD --stop-with-process=4472 --dir="C:\Users\Admin\AppData\Local\Temp\down" --continue=true --max-tries=0 --max-connection-per-server=15 --min-split-size=5M --split=10 --max-concurrent-downloads=5 --file-allocation=falloc2⤵
- Executes dropped EXE
PID:1020
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.3MB
MD553d237cbbdac5ae3dc65c9ee8a51094d
SHA1b2aa5c6150f556f3fa6f6904ac57befc07a14b6d
SHA2562646c5d3eb8b0fc57e85f30434cef3d3a261d01f065fc4ad23f020c31f1dd6bd
SHA5127a29d0fbcca4402c32756ccdf8b8c79a36512d005f695d8eb9b8c88412a57d916e581ae58c55451cf6210cd76d6bdc166121492b1b653719d30a4758a7c3a5cb