Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
485s -
max time network
546s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
25/11/2022, 23:43
Static task
static1
Behavioral task
behavioral1
Sample
ea12a96f78dc042e83961bce685c55db00f85849543f1b9f269e499b2ef91749.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ea12a96f78dc042e83961bce685c55db00f85849543f1b9f269e499b2ef91749.exe
Resource
win10v2004-20221111-en
General
-
Target
ea12a96f78dc042e83961bce685c55db00f85849543f1b9f269e499b2ef91749.exe
-
Size
506KB
-
MD5
b546373f2e12c3699a018fd12cbff93b
-
SHA1
ea061ae6d126046ead0356584b94db1f22845594
-
SHA256
ea12a96f78dc042e83961bce685c55db00f85849543f1b9f269e499b2ef91749
-
SHA512
4fb95292c6a466e04a13dd2ebc3d77306010b6102b919580dc911b3248a3707fca5976f37802aa1269b23f2f3c6851a469e9c20ea699a9ed30cfbf2bde2d7ccb
-
SSDEEP
6144:c9pevPh2Eo0O8TF9lfnuZVl7th2ElizngFeNaYeWhlAFGfe/QxhR/WTEouydyogy:1PhsG9IZVpSgDYeW3AwGiHGD
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4624 wrote to memory of 2548 4624 ea12a96f78dc042e83961bce685c55db00f85849543f1b9f269e499b2ef91749.exe 81 PID 4624 wrote to memory of 2548 4624 ea12a96f78dc042e83961bce685c55db00f85849543f1b9f269e499b2ef91749.exe 81 PID 4624 wrote to memory of 2548 4624 ea12a96f78dc042e83961bce685c55db00f85849543f1b9f269e499b2ef91749.exe 81 PID 4624 wrote to memory of 2628 4624 ea12a96f78dc042e83961bce685c55db00f85849543f1b9f269e499b2ef91749.exe 82 PID 4624 wrote to memory of 2628 4624 ea12a96f78dc042e83961bce685c55db00f85849543f1b9f269e499b2ef91749.exe 82 PID 4624 wrote to memory of 2628 4624 ea12a96f78dc042e83961bce685c55db00f85849543f1b9f269e499b2ef91749.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea12a96f78dc042e83961bce685c55db00f85849543f1b9f269e499b2ef91749.exe"C:\Users\Admin\AppData\Local\Temp\ea12a96f78dc042e83961bce685c55db00f85849543f1b9f269e499b2ef91749.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Users\Admin\AppData\Local\Temp\ea12a96f78dc042e83961bce685c55db00f85849543f1b9f269e499b2ef91749.exestart2⤵PID:2548
-
-
C:\Users\Admin\AppData\Local\Temp\ea12a96f78dc042e83961bce685c55db00f85849543f1b9f269e499b2ef91749.exewatch2⤵PID:2628
-