Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
91s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
22/09/2022, 08:37
Static task
static1
Behavioral task
behavioral1
Sample
58c6c96b1dc0ef32b912c1e4c56a680f0e78d7483bc49ad1952826d5523e7606.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
58c6c96b1dc0ef32b912c1e4c56a680f0e78d7483bc49ad1952826d5523e7606.exe
Resource
win10v2004-20220812-en
General
-
Target
58c6c96b1dc0ef32b912c1e4c56a680f0e78d7483bc49ad1952826d5523e7606.exe
-
Size
15.5MB
-
MD5
993ed0ba6ae77c1b561d724edc1d45de
-
SHA1
4dc43a9b3c5cb4b8a840bd5d791863d651f876cd
-
SHA256
58c6c96b1dc0ef32b912c1e4c56a680f0e78d7483bc49ad1952826d5523e7606
-
SHA512
b684716c4415e8bb347f17e6df1bae7a60d625446177f8c961c7b57602663e644d53c355ae1eaac91a5d568fdd144c8501fc1cd1a830c822e56e4b503cb8288f
-
SSDEEP
393216:fqr7HXo//aspgFN4g6LCsOzPRtYm9o5/8iEKDsplelrJoW+1DJLmiHtSez7:yfH4a14vCRz3Ym94NE2PP+1DwTi
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3956 58c6c96b1dc0ef32b912c1e4c56a680f0e78d7483bc49ad1952826d5523e7606.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4184 wrote to memory of 3956 4184 58c6c96b1dc0ef32b912c1e4c56a680f0e78d7483bc49ad1952826d5523e7606.exe 79 PID 4184 wrote to memory of 3956 4184 58c6c96b1dc0ef32b912c1e4c56a680f0e78d7483bc49ad1952826d5523e7606.exe 79 PID 4184 wrote to memory of 3956 4184 58c6c96b1dc0ef32b912c1e4c56a680f0e78d7483bc49ad1952826d5523e7606.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\58c6c96b1dc0ef32b912c1e4c56a680f0e78d7483bc49ad1952826d5523e7606.exe"C:\Users\Admin\AppData\Local\Temp\58c6c96b1dc0ef32b912c1e4c56a680f0e78d7483bc49ad1952826d5523e7606.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4184 -
C:\Users\Admin\AppData\Local\Temp\is-11NA6.tmp\58c6c96b1dc0ef32b912c1e4c56a680f0e78d7483bc49ad1952826d5523e7606.tmp"C:\Users\Admin\AppData\Local\Temp\is-11NA6.tmp\58c6c96b1dc0ef32b912c1e4c56a680f0e78d7483bc49ad1952826d5523e7606.tmp" /SL5="$801BE,15899800,114176,C:\Users\Admin\AppData\Local\Temp\58c6c96b1dc0ef32b912c1e4c56a680f0e78d7483bc49ad1952826d5523e7606.exe"2⤵
- Executes dropped EXE
PID:3956
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\is-11NA6.tmp\58c6c96b1dc0ef32b912c1e4c56a680f0e78d7483bc49ad1952826d5523e7606.tmp
Filesize1.1MB
MD54b6d752df7add5d5e17f6bfd9c21ee4c
SHA1064b201a03ce836248e0c3b25064389d6ceb36f3
SHA256e314bea833e7b27c4ce59e212add98da81bc1a56b795089133530289a915583a
SHA512dd188de2ce9a4b6bbbeaffe02f00ffdf381389d409b3fe532db3a710dd307edbdef3c1e7a3702909957481e68df965726fb317f5fc7e2ddb08d647654e672e51
-
C:\Users\Admin\AppData\Local\Temp\is-11NA6.tmp\58c6c96b1dc0ef32b912c1e4c56a680f0e78d7483bc49ad1952826d5523e7606.tmp
Filesize1.1MB
MD54b6d752df7add5d5e17f6bfd9c21ee4c
SHA1064b201a03ce836248e0c3b25064389d6ceb36f3
SHA256e314bea833e7b27c4ce59e212add98da81bc1a56b795089133530289a915583a
SHA512dd188de2ce9a4b6bbbeaffe02f00ffdf381389d409b3fe532db3a710dd307edbdef3c1e7a3702909957481e68df965726fb317f5fc7e2ddb08d647654e672e51