Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
114s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16/12/2024, 13:43
Static task
static1
Behavioral task
behavioral1
Sample
6452af32887b676352a3c81057bd89385292f7660f01be8f1c102380cc415c5a.exe
Resource
win7-20241010-en
General
-
Target
6452af32887b676352a3c81057bd89385292f7660f01be8f1c102380cc415c5a.exe
-
Size
1005KB
-
MD5
ea10363200a7a140a53a8f85e64fe25d
-
SHA1
a935f4a0ccde0b0297819da87bf56fa4accd37d3
-
SHA256
6452af32887b676352a3c81057bd89385292f7660f01be8f1c102380cc415c5a
-
SHA512
94f2dc86a89227096598e6f1f5f72d9129b58858da4cd1ae4e48e6ebe8604215641b82e0b7fa70e2363092f2cde85ce7bd6cc830e4508c857610fac7cafe160a
-
SSDEEP
24576:84t9IZNP9LIwKB6wuLjMixA298HC4YrX+yc3d:nmqwKEHD+fi4Y+ye
Malware Config
Extracted
systembc
wodresomdaymomentum.org
-
dns
5.132.191.104
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 3 IoCs
description pid Process procid_target PID 3492 created 3388 3492 6452af32887b676352a3c81057bd89385292f7660f01be8f1c102380cc415c5a.exe 56 PID 1636 created 3388 1636 thul.exe 56 PID 440 created 3388 440 thul.exe 56 -
Systembc family
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\dnswin.vbs 6452af32887b676352a3c81057bd89385292f7660f01be8f1c102380cc415c5a.exe -
Executes dropped EXE 4 IoCs
pid Process 1636 thul.exe 4328 thul.exe 440 thul.exe 4268 thul.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3492 set thread context of 3304 3492 6452af32887b676352a3c81057bd89385292f7660f01be8f1c102380cc415c5a.exe 92 PID 1636 set thread context of 4328 1636 thul.exe 101 PID 440 set thread context of 4268 440 thul.exe 103 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\Test Task17.job 6452af32887b676352a3c81057bd89385292f7660f01be8f1c102380cc415c5a.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6452af32887b676352a3c81057bd89385292f7660f01be8f1c102380cc415c5a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6452af32887b676352a3c81057bd89385292f7660f01be8f1c102380cc415c5a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thul.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thul.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thul.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 3492 6452af32887b676352a3c81057bd89385292f7660f01be8f1c102380cc415c5a.exe 1636 thul.exe 440 thul.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 3492 6452af32887b676352a3c81057bd89385292f7660f01be8f1c102380cc415c5a.exe Token: SeDebugPrivilege 3492 6452af32887b676352a3c81057bd89385292f7660f01be8f1c102380cc415c5a.exe Token: SeDebugPrivilege 1636 thul.exe Token: SeDebugPrivilege 1636 thul.exe Token: SeDebugPrivilege 440 thul.exe Token: SeDebugPrivilege 440 thul.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 3492 wrote to memory of 3304 3492 6452af32887b676352a3c81057bd89385292f7660f01be8f1c102380cc415c5a.exe 92 PID 3492 wrote to memory of 3304 3492 6452af32887b676352a3c81057bd89385292f7660f01be8f1c102380cc415c5a.exe 92 PID 3492 wrote to memory of 3304 3492 6452af32887b676352a3c81057bd89385292f7660f01be8f1c102380cc415c5a.exe 92 PID 3492 wrote to memory of 3304 3492 6452af32887b676352a3c81057bd89385292f7660f01be8f1c102380cc415c5a.exe 92 PID 3492 wrote to memory of 3304 3492 6452af32887b676352a3c81057bd89385292f7660f01be8f1c102380cc415c5a.exe 92 PID 3492 wrote to memory of 3304 3492 6452af32887b676352a3c81057bd89385292f7660f01be8f1c102380cc415c5a.exe 92 PID 3492 wrote to memory of 3304 3492 6452af32887b676352a3c81057bd89385292f7660f01be8f1c102380cc415c5a.exe 92 PID 3492 wrote to memory of 3304 3492 6452af32887b676352a3c81057bd89385292f7660f01be8f1c102380cc415c5a.exe 92 PID 1636 wrote to memory of 4328 1636 thul.exe 101 PID 1636 wrote to memory of 4328 1636 thul.exe 101 PID 1636 wrote to memory of 4328 1636 thul.exe 101 PID 1636 wrote to memory of 4328 1636 thul.exe 101 PID 1636 wrote to memory of 4328 1636 thul.exe 101 PID 1636 wrote to memory of 4328 1636 thul.exe 101 PID 1636 wrote to memory of 4328 1636 thul.exe 101 PID 1636 wrote to memory of 4328 1636 thul.exe 101 PID 440 wrote to memory of 4268 440 thul.exe 103 PID 440 wrote to memory of 4268 440 thul.exe 103 PID 440 wrote to memory of 4268 440 thul.exe 103 PID 440 wrote to memory of 4268 440 thul.exe 103 PID 440 wrote to memory of 4268 440 thul.exe 103 PID 440 wrote to memory of 4268 440 thul.exe 103 PID 440 wrote to memory of 4268 440 thul.exe 103 PID 440 wrote to memory of 4268 440 thul.exe 103
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3388
-
C:\Users\Admin\AppData\Local\Temp\6452af32887b676352a3c81057bd89385292f7660f01be8f1c102380cc415c5a.exe"C:\Users\Admin\AppData\Local\Temp\6452af32887b676352a3c81057bd89385292f7660f01be8f1c102380cc415c5a.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops startup file
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3492
-
-
C:\Users\Admin\AppData\Local\Temp\6452af32887b676352a3c81057bd89385292f7660f01be8f1c102380cc415c5a.exe"C:\Users\Admin\AppData\Local\Temp\6452af32887b676352a3c81057bd89385292f7660f01be8f1c102380cc415c5a.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3304
-
-
C:\ProgramData\vkkea\thul.exe"C:\ProgramData\vkkea\thul.exe"2⤵
- Executes dropped EXE
PID:4328
-
-
C:\ProgramData\vkkea\thul.exe"C:\ProgramData\vkkea\thul.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4268
-
-
C:\ProgramData\vkkea\thul.exeC:\ProgramData\vkkea\thul.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1636
-
C:\ProgramData\vkkea\thul.exeC:\ProgramData\vkkea\thul.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:440
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1005KB
MD5ea10363200a7a140a53a8f85e64fe25d
SHA1a935f4a0ccde0b0297819da87bf56fa4accd37d3
SHA2566452af32887b676352a3c81057bd89385292f7660f01be8f1c102380cc415c5a
SHA51294f2dc86a89227096598e6f1f5f72d9129b58858da4cd1ae4e48e6ebe8604215641b82e0b7fa70e2363092f2cde85ce7bd6cc830e4508c857610fac7cafe160a
-
Filesize
232B
MD52baa903340eb29fc8fb34792ccd48ae4
SHA1dead97ae80576619567b0c1e67c72821bc931186
SHA256939f26fd4cbd4dace9cff45dfbc1851c967a73b4dd8c2de980f65b55ace28406
SHA512e5017aee1b38f89acca95f37f7dbb2f4a4fbf9e9cd740b3a177621f149affc9ed6da3d7daab8ad08e0108c0b9d754eb200985897849172eb2450f7a35a490931