Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
203s -
max time network
208s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
25/11/2022, 22:55
Static task
static1
Behavioral task
behavioral1
Sample
0181ff42f8ea4dd625560b4bc7ae7de9594b76a86b779f76a67efe23a2560f48.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0181ff42f8ea4dd625560b4bc7ae7de9594b76a86b779f76a67efe23a2560f48.exe
Resource
win10v2004-20221111-en
General
-
Target
0181ff42f8ea4dd625560b4bc7ae7de9594b76a86b779f76a67efe23a2560f48.exe
-
Size
2.1MB
-
MD5
7cbfe384ab73c87c8c915121d808cb2f
-
SHA1
dc2727ed544ab9544a5e1f3174f959e7f35b20e4
-
SHA256
0181ff42f8ea4dd625560b4bc7ae7de9594b76a86b779f76a67efe23a2560f48
-
SHA512
64e678180ccbd2c9085b75b8a23fdb4ae5c3af9d4ce5fe13b5bbb77d6c40dd426171c9c03813a1fc36b7520a29976f3f18759a6984bacc7c644bc1f117db15d0
-
SSDEEP
49152:aaGGzyuP7BQo2d1unAn8HzXD3Jc5k6wsY2jnCwn53u9TDam:TG/uzBQoeuzzXD5c5k60qnCwnA93
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4064 0181ff42f8ea4dd625560b4bc7ae7de9594b76a86b779f76a67efe23a2560f48.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 832 wrote to memory of 4064 832 0181ff42f8ea4dd625560b4bc7ae7de9594b76a86b779f76a67efe23a2560f48.exe 84 PID 832 wrote to memory of 4064 832 0181ff42f8ea4dd625560b4bc7ae7de9594b76a86b779f76a67efe23a2560f48.exe 84 PID 832 wrote to memory of 4064 832 0181ff42f8ea4dd625560b4bc7ae7de9594b76a86b779f76a67efe23a2560f48.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\0181ff42f8ea4dd625560b4bc7ae7de9594b76a86b779f76a67efe23a2560f48.exe"C:\Users\Admin\AppData\Local\Temp\0181ff42f8ea4dd625560b4bc7ae7de9594b76a86b779f76a67efe23a2560f48.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Users\Admin\AppData\Local\Temp\is-UG8R1.tmp\0181ff42f8ea4dd625560b4bc7ae7de9594b76a86b779f76a67efe23a2560f48.tmp"C:\Users\Admin\AppData\Local\Temp\is-UG8R1.tmp\0181ff42f8ea4dd625560b4bc7ae7de9594b76a86b779f76a67efe23a2560f48.tmp" /SL5="$1101E6,1946005,54784,C:\Users\Admin\AppData\Local\Temp\0181ff42f8ea4dd625560b4bc7ae7de9594b76a86b779f76a67efe23a2560f48.exe"2⤵
- Executes dropped EXE
PID:4064
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\is-UG8R1.tmp\0181ff42f8ea4dd625560b4bc7ae7de9594b76a86b779f76a67efe23a2560f48.tmp
Filesize687KB
MD58f144bcbcad0417e7823dd8e60218530
SHA19df092a764b8ad278ed574f00d1c065683eef6ac
SHA25639dfa032878743bba8244c73173c263e669131f0084a38f22c52b1383f627ba0
SHA512e093f69030fee17d8b55bde8337d409e8dfb583c97a81ed37425fb72122318d4c1f996d0d1bca28f24182ff5c8afe2be25eadc27951463ddca5c0abceca2a72d
-
C:\Users\Admin\AppData\Local\Temp\is-UG8R1.tmp\0181ff42f8ea4dd625560b4bc7ae7de9594b76a86b779f76a67efe23a2560f48.tmp
Filesize687KB
MD58f144bcbcad0417e7823dd8e60218530
SHA19df092a764b8ad278ed574f00d1c065683eef6ac
SHA25639dfa032878743bba8244c73173c263e669131f0084a38f22c52b1383f627ba0
SHA512e093f69030fee17d8b55bde8337d409e8dfb583c97a81ed37425fb72122318d4c1f996d0d1bca28f24182ff5c8afe2be25eadc27951463ddca5c0abceca2a72d