Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
92s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2022, 15:06
Static task
static1
Behavioral task
behavioral1
Sample
bcc6630d0cf034c6df6daea401aea183b2d1ff2f961eeaec9040d03b9d080ec7.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
bcc6630d0cf034c6df6daea401aea183b2d1ff2f961eeaec9040d03b9d080ec7.exe
Resource
win10v2004-20220812-en
General
-
Target
bcc6630d0cf034c6df6daea401aea183b2d1ff2f961eeaec9040d03b9d080ec7.exe
-
Size
507KB
-
MD5
56b69870745ee39d50e6afd1db8661c6
-
SHA1
74fe9fb51dd247621c6776ec0f7798b3a28d8532
-
SHA256
bcc6630d0cf034c6df6daea401aea183b2d1ff2f961eeaec9040d03b9d080ec7
-
SHA512
89bab99130eca39ea129fd6f9baf8f7bcbad325416c84cc4a2a61767485620149dc35137e7e1cce18d4498aa2a529b243336301eaf8f0966555c46b0d8a4cdb5
-
SSDEEP
6144:KINa9uHeh5TD91UWt3NKNlmxQZNpnc8lr2GmD0hXvCzIcN5fcFkJr1kJWjE:V+h592k38e+yurm2az40mW
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4572 wrote to memory of 752 4572 bcc6630d0cf034c6df6daea401aea183b2d1ff2f961eeaec9040d03b9d080ec7.exe 80 PID 4572 wrote to memory of 752 4572 bcc6630d0cf034c6df6daea401aea183b2d1ff2f961eeaec9040d03b9d080ec7.exe 80 PID 4572 wrote to memory of 752 4572 bcc6630d0cf034c6df6daea401aea183b2d1ff2f961eeaec9040d03b9d080ec7.exe 80 PID 4572 wrote to memory of 3172 4572 bcc6630d0cf034c6df6daea401aea183b2d1ff2f961eeaec9040d03b9d080ec7.exe 81 PID 4572 wrote to memory of 3172 4572 bcc6630d0cf034c6df6daea401aea183b2d1ff2f961eeaec9040d03b9d080ec7.exe 81 PID 4572 wrote to memory of 3172 4572 bcc6630d0cf034c6df6daea401aea183b2d1ff2f961eeaec9040d03b9d080ec7.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\bcc6630d0cf034c6df6daea401aea183b2d1ff2f961eeaec9040d03b9d080ec7.exe"C:\Users\Admin\AppData\Local\Temp\bcc6630d0cf034c6df6daea401aea183b2d1ff2f961eeaec9040d03b9d080ec7.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Users\Admin\AppData\Local\Temp\bcc6630d0cf034c6df6daea401aea183b2d1ff2f961eeaec9040d03b9d080ec7.exestart2⤵PID:752
-
-
C:\Users\Admin\AppData\Local\Temp\bcc6630d0cf034c6df6daea401aea183b2d1ff2f961eeaec9040d03b9d080ec7.exewatch2⤵PID:3172
-