Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
94s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06/11/2022, 13:06
Behavioral task
behavioral1
Sample
d403bf9a67d5208f7cf30532498ebaa939fd72df413e21b6d5bd44d856117dd9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d403bf9a67d5208f7cf30532498ebaa939fd72df413e21b6d5bd44d856117dd9.exe
Resource
win10v2004-20220812-en
General
-
Target
d403bf9a67d5208f7cf30532498ebaa939fd72df413e21b6d5bd44d856117dd9.exe
-
Size
150KB
-
MD5
0e4c6787230990b1d6ab37e529bfdeea
-
SHA1
cbf69bfe5601a21b101bed6bfc771fe72e28dab9
-
SHA256
d403bf9a67d5208f7cf30532498ebaa939fd72df413e21b6d5bd44d856117dd9
-
SHA512
17f79e7d4480302736ad700086c5307ded3d940260fa6671d234b20ade0b07d66dc09d927b6747aa42c878a1d2f830603480ac530e5be45710ee8a479b69fa23
-
SSDEEP
3072:4DCuZBN4kQZbXQRH2mlj7ud7s01DHVWsrv0:4DCc45Zb2WW6dY0JHVWsrc
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2056 apocalyps32.exe -
resource yara_rule behavioral2/memory/1064-132-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1064-133-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000022f5f-135.dat upx behavioral2/files/0x000a000000022f5f-136.dat upx behavioral2/memory/2056-137-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1064-138-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2056-140-0x0000000040010000-0x000000004004B000-memory.dmp upx behavioral2/memory/2056-143-0x0000000000400000-0x0000000000427000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\apocalyps32.exe d403bf9a67d5208f7cf30532498ebaa939fd72df413e21b6d5bd44d856117dd9.exe File opened for modification C:\Windows\apocalyps32.exe d403bf9a67d5208f7cf30532498ebaa939fd72df413e21b6d5bd44d856117dd9.exe File created C:\Windows\apocalyps32.exe apocalyps32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1064 wrote to memory of 2056 1064 d403bf9a67d5208f7cf30532498ebaa939fd72df413e21b6d5bd44d856117dd9.exe 79 PID 1064 wrote to memory of 2056 1064 d403bf9a67d5208f7cf30532498ebaa939fd72df413e21b6d5bd44d856117dd9.exe 79 PID 1064 wrote to memory of 2056 1064 d403bf9a67d5208f7cf30532498ebaa939fd72df413e21b6d5bd44d856117dd9.exe 79 PID 2056 wrote to memory of 2820 2056 apocalyps32.exe 80 PID 2056 wrote to memory of 2820 2056 apocalyps32.exe 80 PID 2056 wrote to memory of 2820 2056 apocalyps32.exe 80 PID 2056 wrote to memory of 2820 2056 apocalyps32.exe 80 PID 2056 wrote to memory of 2820 2056 apocalyps32.exe 80 PID 2056 wrote to memory of 2820 2056 apocalyps32.exe 80 PID 2056 wrote to memory of 2820 2056 apocalyps32.exe 80 PID 2056 wrote to memory of 2820 2056 apocalyps32.exe 80 PID 2056 wrote to memory of 2820 2056 apocalyps32.exe 80 PID 2056 wrote to memory of 2820 2056 apocalyps32.exe 80 PID 2056 wrote to memory of 2820 2056 apocalyps32.exe 80 PID 2056 wrote to memory of 2820 2056 apocalyps32.exe 80 PID 2056 wrote to memory of 2820 2056 apocalyps32.exe 80 PID 2056 wrote to memory of 2820 2056 apocalyps32.exe 80 PID 2056 wrote to memory of 2820 2056 apocalyps32.exe 80 PID 2056 wrote to memory of 2820 2056 apocalyps32.exe 80 PID 2056 wrote to memory of 2820 2056 apocalyps32.exe 80 PID 2056 wrote to memory of 2820 2056 apocalyps32.exe 80 PID 2056 wrote to memory of 2820 2056 apocalyps32.exe 80 PID 2056 wrote to memory of 2820 2056 apocalyps32.exe 80 PID 2056 wrote to memory of 2820 2056 apocalyps32.exe 80 PID 2056 wrote to memory of 2820 2056 apocalyps32.exe 80 PID 2056 wrote to memory of 2820 2056 apocalyps32.exe 80 PID 2056 wrote to memory of 2820 2056 apocalyps32.exe 80 PID 2056 wrote to memory of 2820 2056 apocalyps32.exe 80 PID 2056 wrote to memory of 2820 2056 apocalyps32.exe 80 PID 2056 wrote to memory of 2820 2056 apocalyps32.exe 80 PID 2056 wrote to memory of 2820 2056 apocalyps32.exe 80 PID 2056 wrote to memory of 2820 2056 apocalyps32.exe 80 PID 2056 wrote to memory of 2820 2056 apocalyps32.exe 80 PID 2056 wrote to memory of 2820 2056 apocalyps32.exe 80 PID 2056 wrote to memory of 2820 2056 apocalyps32.exe 80 PID 2056 wrote to memory of 2820 2056 apocalyps32.exe 80 PID 2056 wrote to memory of 2820 2056 apocalyps32.exe 80 PID 2056 wrote to memory of 2820 2056 apocalyps32.exe 80 PID 2056 wrote to memory of 2820 2056 apocalyps32.exe 80 PID 2056 wrote to memory of 2820 2056 apocalyps32.exe 80 PID 2056 wrote to memory of 2820 2056 apocalyps32.exe 80 PID 2056 wrote to memory of 2820 2056 apocalyps32.exe 80 PID 2056 wrote to memory of 2820 2056 apocalyps32.exe 80 PID 2056 wrote to memory of 2820 2056 apocalyps32.exe 80 PID 2056 wrote to memory of 2820 2056 apocalyps32.exe 80 PID 2056 wrote to memory of 2820 2056 apocalyps32.exe 80 PID 2056 wrote to memory of 2820 2056 apocalyps32.exe 80 PID 2056 wrote to memory of 2820 2056 apocalyps32.exe 80 PID 2056 wrote to memory of 2820 2056 apocalyps32.exe 80 PID 2056 wrote to memory of 2820 2056 apocalyps32.exe 80 PID 2056 wrote to memory of 2820 2056 apocalyps32.exe 80 PID 2056 wrote to memory of 2820 2056 apocalyps32.exe 80 PID 2056 wrote to memory of 2820 2056 apocalyps32.exe 80 PID 2056 wrote to memory of 2820 2056 apocalyps32.exe 80 PID 2056 wrote to memory of 2820 2056 apocalyps32.exe 80 PID 2056 wrote to memory of 2820 2056 apocalyps32.exe 80 PID 2056 wrote to memory of 2820 2056 apocalyps32.exe 80 PID 2056 wrote to memory of 2820 2056 apocalyps32.exe 80 PID 2056 wrote to memory of 2820 2056 apocalyps32.exe 80 PID 2056 wrote to memory of 2820 2056 apocalyps32.exe 80 PID 2056 wrote to memory of 2820 2056 apocalyps32.exe 80 PID 2056 wrote to memory of 2820 2056 apocalyps32.exe 80 PID 2056 wrote to memory of 2820 2056 apocalyps32.exe 80 PID 2056 wrote to memory of 2820 2056 apocalyps32.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\d403bf9a67d5208f7cf30532498ebaa939fd72df413e21b6d5bd44d856117dd9.exe"C:\Users\Admin\AppData\Local\Temp\d403bf9a67d5208f7cf30532498ebaa939fd72df413e21b6d5bd44d856117dd9.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Windows\apocalyps32.exe-bs2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:2820
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
150KB
MD50e4c6787230990b1d6ab37e529bfdeea
SHA1cbf69bfe5601a21b101bed6bfc771fe72e28dab9
SHA256d403bf9a67d5208f7cf30532498ebaa939fd72df413e21b6d5bd44d856117dd9
SHA51217f79e7d4480302736ad700086c5307ded3d940260fa6671d234b20ade0b07d66dc09d927b6747aa42c878a1d2f830603480ac530e5be45710ee8a479b69fa23
-
Filesize
150KB
MD50e4c6787230990b1d6ab37e529bfdeea
SHA1cbf69bfe5601a21b101bed6bfc771fe72e28dab9
SHA256d403bf9a67d5208f7cf30532498ebaa939fd72df413e21b6d5bd44d856117dd9
SHA51217f79e7d4480302736ad700086c5307ded3d940260fa6671d234b20ade0b07d66dc09d927b6747aa42c878a1d2f830603480ac530e5be45710ee8a479b69fa23