Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
179s -
max time network
205s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06/11/2022, 14:56
Behavioral task
behavioral1
Sample
0a2c9e5ce709264618ad11716c950322e325fa8282132d23274e877dea4335cf.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
0a2c9e5ce709264618ad11716c950322e325fa8282132d23274e877dea4335cf.exe
Resource
win10v2004-20220812-en
General
-
Target
0a2c9e5ce709264618ad11716c950322e325fa8282132d23274e877dea4335cf.exe
-
Size
1013KB
-
MD5
08cc8d63928187c405cfc5d3f538d68c
-
SHA1
5b52c843b2975ccf7d572422f7d1e0d3e319edff
-
SHA256
0a2c9e5ce709264618ad11716c950322e325fa8282132d23274e877dea4335cf
-
SHA512
e9aff4280b2fb9b3ba1a9fc05203180f6c656572af1d973365d80640e48b79e1d7207b489161fcc0bd1f2f854e36c6f568086001c0330a1230f1c0ba975ee0b0
-
SSDEEP
24576:19b4AAP4lPtN2Kh7I8iRp2q6IYjAKKzeROCQquQtlTplex6Je:Hb4x4F55I8iRAq6IaAFCXxpl5c
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4264 0a2c9e5ce709264618ad11716c950322e325fa8282132d23274e877dea4335cf.exe 4264 0a2c9e5ce709264618ad11716c950322e325fa8282132d23274e877dea4335cf.exe 4264 0a2c9e5ce709264618ad11716c950322e325fa8282132d23274e877dea4335cf.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4264 wrote to memory of 1744 4264 0a2c9e5ce709264618ad11716c950322e325fa8282132d23274e877dea4335cf.exe 79 PID 4264 wrote to memory of 1744 4264 0a2c9e5ce709264618ad11716c950322e325fa8282132d23274e877dea4335cf.exe 79 PID 4264 wrote to memory of 1744 4264 0a2c9e5ce709264618ad11716c950322e325fa8282132d23274e877dea4335cf.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a2c9e5ce709264618ad11716c950322e325fa8282132d23274e877dea4335cf.exe"C:\Users\Admin\AppData\Local\Temp\0a2c9e5ce709264618ad11716c950322e325fa8282132d23274e877dea4335cf.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c .\SDelinves_1.bat2⤵PID:1744
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
276B
MD5d54707d368bac1f38e3cc4596ba0d4a7
SHA1ca5a811bf801732b2e78b893611c46453dffac5e
SHA2565b44f2f34bfd612bc742d4f93cb00408567cdeff87180e4ec840094fb26aed2a
SHA512def837c1150555a02d4864db5026e2dafdf7e33a71df650481859047f2c22449a2b028e7bb71b35c86b552696c152204ad0634bb7c4533d3485450abd4b97b6e