Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
187s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
25/11/2022, 23:38
Static task
static1
Behavioral task
behavioral1
Sample
a2339c6ba5ff698c2962256e32f652bd187f01a81dca61d702ba0489a45db78c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a2339c6ba5ff698c2962256e32f652bd187f01a81dca61d702ba0489a45db78c.exe
Resource
win10v2004-20221111-en
General
-
Target
a2339c6ba5ff698c2962256e32f652bd187f01a81dca61d702ba0489a45db78c.exe
-
Size
519KB
-
MD5
cb4ecef6e1f1b09c54358b6cb52a4322
-
SHA1
7097273b7ae58e21bb602ffe01084f764708734d
-
SHA256
a2339c6ba5ff698c2962256e32f652bd187f01a81dca61d702ba0489a45db78c
-
SHA512
799263a1df4f5e6969dffb4fc95a411f62a924a961ba74698d7d6004dc1c2b3260a9876523909a8103d5619a024a5d428d8140a0d1b454a400d65e10bfe7042a
-
SSDEEP
12288:pw3gWzJF0YffXCI+CtFaj3uoO54YXpeNZX:yQWzbhnCIRaaoMVpe3X
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4192 wrote to memory of 4568 4192 a2339c6ba5ff698c2962256e32f652bd187f01a81dca61d702ba0489a45db78c.exe 85 PID 4192 wrote to memory of 4568 4192 a2339c6ba5ff698c2962256e32f652bd187f01a81dca61d702ba0489a45db78c.exe 85 PID 4192 wrote to memory of 4568 4192 a2339c6ba5ff698c2962256e32f652bd187f01a81dca61d702ba0489a45db78c.exe 85 PID 4192 wrote to memory of 2144 4192 a2339c6ba5ff698c2962256e32f652bd187f01a81dca61d702ba0489a45db78c.exe 84 PID 4192 wrote to memory of 2144 4192 a2339c6ba5ff698c2962256e32f652bd187f01a81dca61d702ba0489a45db78c.exe 84 PID 4192 wrote to memory of 2144 4192 a2339c6ba5ff698c2962256e32f652bd187f01a81dca61d702ba0489a45db78c.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\a2339c6ba5ff698c2962256e32f652bd187f01a81dca61d702ba0489a45db78c.exe"C:\Users\Admin\AppData\Local\Temp\a2339c6ba5ff698c2962256e32f652bd187f01a81dca61d702ba0489a45db78c.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Users\Admin\AppData\Local\Temp\a2339c6ba5ff698c2962256e32f652bd187f01a81dca61d702ba0489a45db78c.exewatch2⤵PID:2144
-
-
C:\Users\Admin\AppData\Local\Temp\a2339c6ba5ff698c2962256e32f652bd187f01a81dca61d702ba0489a45db78c.exestart2⤵PID:4568
-