Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
91s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
20/10/2022, 00:37
Static task
static1
Behavioral task
behavioral1
Sample
ca1efe9db38768dbaca94dde9465d5ba9ef775b54addca78d9e2d13a241534d0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ca1efe9db38768dbaca94dde9465d5ba9ef775b54addca78d9e2d13a241534d0.exe
Resource
win10v2004-20220812-en
General
-
Target
ca1efe9db38768dbaca94dde9465d5ba9ef775b54addca78d9e2d13a241534d0.exe
-
Size
717KB
-
MD5
a0a14f4ec30ea7b4e6d99a163b58d920
-
SHA1
e5cb70bd970ff92e2e4339248153477c2aec9cc7
-
SHA256
ca1efe9db38768dbaca94dde9465d5ba9ef775b54addca78d9e2d13a241534d0
-
SHA512
33732fff22d56400b4d3556561b52785d8a2596a0e7145184855e849d60f1fb82af40478fa98e46955f36b411a6c620ec377fb63dd5fded5ef8d34396d4fcc2a
-
SSDEEP
6144:s4UHFnuDk67fe2olw9ayyqOxLfPcvgKVivePPMqLckUet72FwBI+AFdb8Muclw9C:6luDk67HG3zKcaMVkUet7EwBI+APuXC
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 5116 ca1efe9db38768dbaca94dde9465d5ba9ef775b54addca78d9e2d13a241534d0.com -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\kernel.dll ca1efe9db38768dbaca94dde9465d5ba9ef775b54addca78d9e2d13a241534d0.exe File created C:\Windows\kernel.dll ca1efe9db38768dbaca94dde9465d5ba9ef775b54addca78d9e2d13a241534d0.exe File created C:\Windows\svchost.exe ca1efe9db38768dbaca94dde9465d5ba9ef775b54addca78d9e2d13a241534d0.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4808 ca1efe9db38768dbaca94dde9465d5ba9ef775b54addca78d9e2d13a241534d0.exe 4808 ca1efe9db38768dbaca94dde9465d5ba9ef775b54addca78d9e2d13a241534d0.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4808 wrote to memory of 5116 4808 ca1efe9db38768dbaca94dde9465d5ba9ef775b54addca78d9e2d13a241534d0.exe 80 PID 4808 wrote to memory of 5116 4808 ca1efe9db38768dbaca94dde9465d5ba9ef775b54addca78d9e2d13a241534d0.exe 80 PID 4808 wrote to memory of 5116 4808 ca1efe9db38768dbaca94dde9465d5ba9ef775b54addca78d9e2d13a241534d0.exe 80 PID 4808 wrote to memory of 3044 4808 ca1efe9db38768dbaca94dde9465d5ba9ef775b54addca78d9e2d13a241534d0.exe 46
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3044
-
C:\Users\Admin\AppData\Local\Temp\ca1efe9db38768dbaca94dde9465d5ba9ef775b54addca78d9e2d13a241534d0.exe"C:\Users\Admin\AppData\Local\Temp\ca1efe9db38768dbaca94dde9465d5ba9ef775b54addca78d9e2d13a241534d0.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Users\Admin\AppData\Local\Temp\ca1efe9db38768dbaca94dde9465d5ba9ef775b54addca78d9e2d13a241534d0.comC:\Users\Admin\AppData\Local\Temp\ca1efe9db38768dbaca94dde9465d5ba9ef775b54addca78d9e2d13a241534d0.com3⤵
- Executes dropped EXE
PID:5116
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\ca1efe9db38768dbaca94dde9465d5ba9ef775b54addca78d9e2d13a241534d0.com
Filesize629KB
MD5845eefbe8a39a1f6d7b1b5fd8f49a8df
SHA1a4c7e3414b1514ab1619e1d568b26f09177f5052
SHA25698aa443038a0d106005cb086ed13c8fafb5eda20e56f7e895d2ac666d7658ced
SHA5127e2469c1d6a9e2fe5a5bb9002aff41672e8c70e19f51e823cc29a19881a4ab619aaa45be91ce8d45cdc7357216e923df5500f150167dbc435d9309e2221f65eb
-
C:\Users\Admin\AppData\Local\Temp\ca1efe9db38768dbaca94dde9465d5ba9ef775b54addca78d9e2d13a241534d0.com
Filesize629KB
MD5845eefbe8a39a1f6d7b1b5fd8f49a8df
SHA1a4c7e3414b1514ab1619e1d568b26f09177f5052
SHA25698aa443038a0d106005cb086ed13c8fafb5eda20e56f7e895d2ac666d7658ced
SHA5127e2469c1d6a9e2fe5a5bb9002aff41672e8c70e19f51e823cc29a19881a4ab619aaa45be91ce8d45cdc7357216e923df5500f150167dbc435d9309e2221f65eb