Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
186s -
max time network
191s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2022, 10:01
Static task
static1
Behavioral task
behavioral1
Sample
a513281e06c6cdab208b1889f90e4d65f8b5c2a0b606eebecdc0cee029bbed94.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a513281e06c6cdab208b1889f90e4d65f8b5c2a0b606eebecdc0cee029bbed94.exe
Resource
win10v2004-20220812-en
General
-
Target
a513281e06c6cdab208b1889f90e4d65f8b5c2a0b606eebecdc0cee029bbed94.exe
-
Size
525KB
-
MD5
2ae386c0979e6e613519ec0052a7df84
-
SHA1
ee8be80eee61989e4f6ad1473434fd4dd3f9dfe5
-
SHA256
a513281e06c6cdab208b1889f90e4d65f8b5c2a0b606eebecdc0cee029bbed94
-
SHA512
3130bd006d9f9484af3f5e8df50fc554ad01b1d94f9c6f8630f1aea3a7d6e89fd7fa97c7e5ae74c72c7d840ff2db1244b2515c46c181bf0f47e55e9c7ec7f46b
-
SSDEEP
6144:92ZDQq2ezQqK191LfxMgrP3h06/O+jrFppDGL+nc5EvIuebIiqwadGVLtYrpyuBK:92ZDQezQqEMgbq2GSc28IivadGk6p0W
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4844 wrote to memory of 4560 4844 a513281e06c6cdab208b1889f90e4d65f8b5c2a0b606eebecdc0cee029bbed94.exe 78 PID 4844 wrote to memory of 4560 4844 a513281e06c6cdab208b1889f90e4d65f8b5c2a0b606eebecdc0cee029bbed94.exe 78 PID 4844 wrote to memory of 4560 4844 a513281e06c6cdab208b1889f90e4d65f8b5c2a0b606eebecdc0cee029bbed94.exe 78 PID 4844 wrote to memory of 372 4844 a513281e06c6cdab208b1889f90e4d65f8b5c2a0b606eebecdc0cee029bbed94.exe 79 PID 4844 wrote to memory of 372 4844 a513281e06c6cdab208b1889f90e4d65f8b5c2a0b606eebecdc0cee029bbed94.exe 79 PID 4844 wrote to memory of 372 4844 a513281e06c6cdab208b1889f90e4d65f8b5c2a0b606eebecdc0cee029bbed94.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\a513281e06c6cdab208b1889f90e4d65f8b5c2a0b606eebecdc0cee029bbed94.exe"C:\Users\Admin\AppData\Local\Temp\a513281e06c6cdab208b1889f90e4d65f8b5c2a0b606eebecdc0cee029bbed94.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Users\Admin\AppData\Local\Temp\a513281e06c6cdab208b1889f90e4d65f8b5c2a0b606eebecdc0cee029bbed94.exestart2⤵PID:4560
-
-
C:\Users\Admin\AppData\Local\Temp\a513281e06c6cdab208b1889f90e4d65f8b5c2a0b606eebecdc0cee029bbed94.exewatch2⤵PID:372
-