Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
156s -
max time network
178s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2022, 09:55
Static task
static1
Behavioral task
behavioral1
Sample
c76a45eceebdc3eb361cffe48603390cbb6bab4d2033b37d0f48bbaa8da64013.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c76a45eceebdc3eb361cffe48603390cbb6bab4d2033b37d0f48bbaa8da64013.exe
Resource
win10v2004-20220812-en
General
-
Target
c76a45eceebdc3eb361cffe48603390cbb6bab4d2033b37d0f48bbaa8da64013.exe
-
Size
529KB
-
MD5
e6986f8754c0210ac06ae0eebfb3f8d1
-
SHA1
092e6e4ae0308571e4d7c35cc508889f6cb8a019
-
SHA256
c76a45eceebdc3eb361cffe48603390cbb6bab4d2033b37d0f48bbaa8da64013
-
SHA512
2a316dfdf3b05e6b2ffe156bf79a736510aacbe5fdae33007b550b25d2db744483b6ca70246234dd010032fe7b86f1dc1b3ce602c79aff2da9e1b6e7a32ab06d
-
SSDEEP
6144:V2ZJmauJrCTmpsQd4+W8a23SdaUD/W1YaXrQXFBI0EUIP6eaP8w55keL:V2Z76CTm9u80RDuud36G0AD
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4172 wrote to memory of 1208 4172 c76a45eceebdc3eb361cffe48603390cbb6bab4d2033b37d0f48bbaa8da64013.exe 80 PID 4172 wrote to memory of 1208 4172 c76a45eceebdc3eb361cffe48603390cbb6bab4d2033b37d0f48bbaa8da64013.exe 80 PID 4172 wrote to memory of 1208 4172 c76a45eceebdc3eb361cffe48603390cbb6bab4d2033b37d0f48bbaa8da64013.exe 80 PID 4172 wrote to memory of 5028 4172 c76a45eceebdc3eb361cffe48603390cbb6bab4d2033b37d0f48bbaa8da64013.exe 81 PID 4172 wrote to memory of 5028 4172 c76a45eceebdc3eb361cffe48603390cbb6bab4d2033b37d0f48bbaa8da64013.exe 81 PID 4172 wrote to memory of 5028 4172 c76a45eceebdc3eb361cffe48603390cbb6bab4d2033b37d0f48bbaa8da64013.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\c76a45eceebdc3eb361cffe48603390cbb6bab4d2033b37d0f48bbaa8da64013.exe"C:\Users\Admin\AppData\Local\Temp\c76a45eceebdc3eb361cffe48603390cbb6bab4d2033b37d0f48bbaa8da64013.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Users\Admin\AppData\Local\Temp\c76a45eceebdc3eb361cffe48603390cbb6bab4d2033b37d0f48bbaa8da64013.exestart2⤵PID:1208
-
-
C:\Users\Admin\AppData\Local\Temp\c76a45eceebdc3eb361cffe48603390cbb6bab4d2033b37d0f48bbaa8da64013.exewatch2⤵PID:5028
-