Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
174s -
max time network
184s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
22/11/2022, 01:53
Static task
static1
Behavioral task
behavioral1
Sample
f56aba0ec26470367987f93ccdf1b01cd4d88b84de864e75d43ef99f3c18882e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f56aba0ec26470367987f93ccdf1b01cd4d88b84de864e75d43ef99f3c18882e.exe
Resource
win10v2004-20221111-en
General
-
Target
f56aba0ec26470367987f93ccdf1b01cd4d88b84de864e75d43ef99f3c18882e.exe
-
Size
522KB
-
MD5
54e5ec0666c45f9d399c54e975369aac
-
SHA1
6d9fe3bfe46465814d1851701e52d07eeef91044
-
SHA256
f56aba0ec26470367987f93ccdf1b01cd4d88b84de864e75d43ef99f3c18882e
-
SHA512
86dcba8ea3d0ef2c973def5c3e9d1428ceb386b99dada8977ef92d35d7dccc43cdd2d5fd881750a7a3d123804ff320bbdda78db9f31ab2e122f675aa6ad19cf4
-
SSDEEP
12288:upApzetnSL7CSzOje6lwKKy18xQqpx8O5o:uCl+nSqSzOSUUatqpx8
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2372 wrote to memory of 4004 2372 f56aba0ec26470367987f93ccdf1b01cd4d88b84de864e75d43ef99f3c18882e.exe 83 PID 2372 wrote to memory of 4004 2372 f56aba0ec26470367987f93ccdf1b01cd4d88b84de864e75d43ef99f3c18882e.exe 83 PID 2372 wrote to memory of 4004 2372 f56aba0ec26470367987f93ccdf1b01cd4d88b84de864e75d43ef99f3c18882e.exe 83 PID 2372 wrote to memory of 4616 2372 f56aba0ec26470367987f93ccdf1b01cd4d88b84de864e75d43ef99f3c18882e.exe 84 PID 2372 wrote to memory of 4616 2372 f56aba0ec26470367987f93ccdf1b01cd4d88b84de864e75d43ef99f3c18882e.exe 84 PID 2372 wrote to memory of 4616 2372 f56aba0ec26470367987f93ccdf1b01cd4d88b84de864e75d43ef99f3c18882e.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\f56aba0ec26470367987f93ccdf1b01cd4d88b84de864e75d43ef99f3c18882e.exe"C:\Users\Admin\AppData\Local\Temp\f56aba0ec26470367987f93ccdf1b01cd4d88b84de864e75d43ef99f3c18882e.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\f56aba0ec26470367987f93ccdf1b01cd4d88b84de864e75d43ef99f3c18882e.exestart2⤵PID:4004
-
-
C:\Users\Admin\AppData\Local\Temp\f56aba0ec26470367987f93ccdf1b01cd4d88b84de864e75d43ef99f3c18882e.exewatch2⤵PID:4616
-