Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
205s -
max time network
210s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
24/11/2022, 09:34
Static task
static1
Behavioral task
behavioral1
Sample
b1d34e3957dbc02e0ef4099e5be85b61405579c4cc8cdd41a7dd366d2c3c64df.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b1d34e3957dbc02e0ef4099e5be85b61405579c4cc8cdd41a7dd366d2c3c64df.exe
Resource
win10v2004-20221111-en
General
-
Target
b1d34e3957dbc02e0ef4099e5be85b61405579c4cc8cdd41a7dd366d2c3c64df.exe
-
Size
462KB
-
MD5
d8b7aa603bc654a286db9599e564f514
-
SHA1
da3abb8783638562c459b6e9f623d26005bde66b
-
SHA256
b1d34e3957dbc02e0ef4099e5be85b61405579c4cc8cdd41a7dd366d2c3c64df
-
SHA512
a38143b700613fdb12e5a989130a351270a106e408643ecdbc6c22ce67370c5499259462cede42814b19560b15df5dde6b23d72c06e222a1726d5ea7731f63de
-
SSDEEP
6144:rnyV4xZqCnrhBJLEOJFez9hYjWbTra1EapyKgjl4jEmAZm2zWCUwRnW:rD6Cn1lCbkRUrjl4jFmNaCUG
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2020 wrote to memory of 4036 2020 b1d34e3957dbc02e0ef4099e5be85b61405579c4cc8cdd41a7dd366d2c3c64df.exe 82 PID 2020 wrote to memory of 4036 2020 b1d34e3957dbc02e0ef4099e5be85b61405579c4cc8cdd41a7dd366d2c3c64df.exe 82 PID 2020 wrote to memory of 4036 2020 b1d34e3957dbc02e0ef4099e5be85b61405579c4cc8cdd41a7dd366d2c3c64df.exe 82 PID 2020 wrote to memory of 116 2020 b1d34e3957dbc02e0ef4099e5be85b61405579c4cc8cdd41a7dd366d2c3c64df.exe 83 PID 2020 wrote to memory of 116 2020 b1d34e3957dbc02e0ef4099e5be85b61405579c4cc8cdd41a7dd366d2c3c64df.exe 83 PID 2020 wrote to memory of 116 2020 b1d34e3957dbc02e0ef4099e5be85b61405579c4cc8cdd41a7dd366d2c3c64df.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\b1d34e3957dbc02e0ef4099e5be85b61405579c4cc8cdd41a7dd366d2c3c64df.exe"C:\Users\Admin\AppData\Local\Temp\b1d34e3957dbc02e0ef4099e5be85b61405579c4cc8cdd41a7dd366d2c3c64df.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\b1d34e3957dbc02e0ef4099e5be85b61405579c4cc8cdd41a7dd366d2c3c64df.exestart2⤵PID:4036
-
-
C:\Users\Admin\AppData\Local\Temp\b1d34e3957dbc02e0ef4099e5be85b61405579c4cc8cdd41a7dd366d2c3c64df.exewatch2⤵PID:116
-