Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    155s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    13/07/2024, 18:45

General

  • Target

    e0d0a2764836786c7f0cee2d1fa5b30da73a5f61.exe

  • Size

    258KB

  • MD5

    7dd3e6ae26cab6c0b0e3a4c89d54aa7f

  • SHA1

    e0d0a2764836786c7f0cee2d1fa5b30da73a5f61

  • SHA256

    7b041cde211d98455249cf0d74b68be311b9d8a90cee098770075ad336a5b5c7

  • SHA512

    94f6666b84b371d2f997cbc373f732092922b05ff5d93034beeef79fb07677ecb33343dbd34f4962d098d93a3857930fcb9bfd495f323d8f3d0fea9f0a378b98

  • SSDEEP

    3072:ZLj/06/a80EfzCRVukTBLhTh3BOZOuCS1xiIvsXiS2gtyy7tQuua1WFx0v2vTH3K:Nj80a87fzzuPThb+PBpqtLx1+x0L

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 5 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies data under HKEY_USERS 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e0d0a2764836786c7f0cee2d1fa5b30da73a5f61.exe
    "C:\Users\Admin\AppData\Local\Temp\e0d0a2764836786c7f0cee2d1fa5b30da73a5f61.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2464
    • C:\Users\Admin\AppData\Local\Temp\e0d0a2764836786c7f0cee2d1fa5b30da73a5f61.exe
      "C:\Users\Admin\AppData\Local\Temp\e0d0a2764836786c7f0cee2d1fa5b30da73a5f61.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4664
      • C:\Users\Admin\AppData\Local\Temp\e0d0a2764836786c7f0cee2d1fa5b30da73a5f61.exe
        "C:\Users\Admin\AppData\Local\Temp\e0d0a2764836786c7f0cee2d1fa5b30da73a5f61.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:3424
        • C:\Users\Admin\AppData\Local\Temp\e0d0a2764836786c7f0cee2d1fa5b30da73a5f61.exe
          "C:\Users\Admin\AppData\Local\Temp\e0d0a2764836786c7f0cee2d1fa5b30da73a5f61.exe"
          4⤵
          • Suspicious behavior: RenamesItself
          PID:2496
  • C:\Windows\SysWOW64\bitsserver.exe
    C:\Windows\SysWOW64\bitsserver.exe
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3272
    • C:\Windows\SysWOW64\bitsserver.exe
      C:\Windows\SysWOW64\bitsserver.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4564
      • C:\Windows\SysWOW64\bitsserver.exe
        "C:\Windows\SysWOW64\bitsserver.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:3164
        • C:\Windows\SysWOW64\bitsserver.exe
          "C:\Windows\SysWOW64\bitsserver.exe"
          4⤵
          • Drops file in System32 directory
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          PID:1416

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2464-4-0x0000000000700000-0x0000000000800000-memory.dmp

    Filesize

    1024KB

  • memory/2496-11-0x0000000003000000-0x000000000304C000-memory.dmp

    Filesize

    304KB

  • memory/2496-16-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/3424-10-0x0000000000520000-0x0000000000620000-memory.dmp

    Filesize

    1024KB

  • memory/4664-1-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/4664-5-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/4664-3-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB