Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
28/11/2022, 02:47
Static task
static1
Behavioral task
behavioral1
Sample
0db9bb7b7bc520b7b85e2529246f40a8ecea63fdb96d25914e858082282f71fe.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0db9bb7b7bc520b7b85e2529246f40a8ecea63fdb96d25914e858082282f71fe.exe
Resource
win10v2004-20221111-en
General
-
Target
0db9bb7b7bc520b7b85e2529246f40a8ecea63fdb96d25914e858082282f71fe.exe
-
Size
3.2MB
-
MD5
35ce705c3e17e7e699140f585bb511d1
-
SHA1
86e7c53522280c4535971a0b15d19d593871ff16
-
SHA256
0db9bb7b7bc520b7b85e2529246f40a8ecea63fdb96d25914e858082282f71fe
-
SHA512
0e138b135d76e23d1389e04bb8b62782cabada43af3b8fe693a78c7d974cd99bf0cdfc4334d0718c8acb81b1e2c08ed40ddcae90ce010e2d0763309c2b7e05b8
-
SSDEEP
98304:bIsZK9ywqjKauEGpFcn9M1uzuZyHiDw5GoOG2T:kscgeEH9M1KukHiD9oON
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1792 0db9bb7b7bc520b7b85e2529246f40a8ecea63fdb96d25914e858082282f71fe.tmp -
Loads dropped DLL 2 IoCs
pid Process 1792 0db9bb7b7bc520b7b85e2529246f40a8ecea63fdb96d25914e858082282f71fe.tmp 1792 0db9bb7b7bc520b7b85e2529246f40a8ecea63fdb96d25914e858082282f71fe.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 364 wrote to memory of 1792 364 0db9bb7b7bc520b7b85e2529246f40a8ecea63fdb96d25914e858082282f71fe.exe 83 PID 364 wrote to memory of 1792 364 0db9bb7b7bc520b7b85e2529246f40a8ecea63fdb96d25914e858082282f71fe.exe 83 PID 364 wrote to memory of 1792 364 0db9bb7b7bc520b7b85e2529246f40a8ecea63fdb96d25914e858082282f71fe.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\0db9bb7b7bc520b7b85e2529246f40a8ecea63fdb96d25914e858082282f71fe.exe"C:\Users\Admin\AppData\Local\Temp\0db9bb7b7bc520b7b85e2529246f40a8ecea63fdb96d25914e858082282f71fe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:364 -
C:\Users\Admin\AppData\Local\Temp\is-L7GF8.tmp\0db9bb7b7bc520b7b85e2529246f40a8ecea63fdb96d25914e858082282f71fe.tmp"C:\Users\Admin\AppData\Local\Temp\is-L7GF8.tmp\0db9bb7b7bc520b7b85e2529246f40a8ecea63fdb96d25914e858082282f71fe.tmp" /SL5="$C01C0,2966055,59392,C:\Users\Admin\AppData\Local\Temp\0db9bb7b7bc520b7b85e2529246f40a8ecea63fdb96d25914e858082282f71fe.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1792
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD577d6d961f71a8c558513bed6fd0ad6f1
SHA1122bb9ed6704b72250e4e31b5d5fc2f0476c4b6a
SHA2565da7c8d33d3b7db46277012d92875c0b850c8abf1eb3c8c9c5b9532089a0bcf0
SHA512b0921e2442b4cdec8cc479ba3751a01c0646a4804e2f4a5d5632fa2dbf54cc45d4cccffa4d5b522d42afc2f6a622e07882ed7e663c8462333b082e82503f335a
-
Filesize
23KB
MD577d6d961f71a8c558513bed6fd0ad6f1
SHA1122bb9ed6704b72250e4e31b5d5fc2f0476c4b6a
SHA2565da7c8d33d3b7db46277012d92875c0b850c8abf1eb3c8c9c5b9532089a0bcf0
SHA512b0921e2442b4cdec8cc479ba3751a01c0646a4804e2f4a5d5632fa2dbf54cc45d4cccffa4d5b522d42afc2f6a622e07882ed7e663c8462333b082e82503f335a
-
C:\Users\Admin\AppData\Local\Temp\is-L7GF8.tmp\0db9bb7b7bc520b7b85e2529246f40a8ecea63fdb96d25914e858082282f71fe.tmp
Filesize707KB
MD56a729494be0848daf9b8cb512fe1c1e2
SHA13375fed20d3bf90d160fb8e7aaf518adfd499fdb
SHA256826b4eaf82bf4fd553b1a0682e8e0e526094133560a01b99f29bc3f7ccc91979
SHA5122f30ee4210ec3fd31a8f5934c3bd747587a0082f759fc6361af1516c43120f26da1e888ed5fafc6ce76ae2e1e2adaf5398c6801696d68e31b6f223ed1bfac108
-
C:\Users\Admin\AppData\Local\Temp\is-L7GF8.tmp\0db9bb7b7bc520b7b85e2529246f40a8ecea63fdb96d25914e858082282f71fe.tmp
Filesize707KB
MD56a729494be0848daf9b8cb512fe1c1e2
SHA13375fed20d3bf90d160fb8e7aaf518adfd499fdb
SHA256826b4eaf82bf4fd553b1a0682e8e0e526094133560a01b99f29bc3f7ccc91979
SHA5122f30ee4210ec3fd31a8f5934c3bd747587a0082f759fc6361af1516c43120f26da1e888ed5fafc6ce76ae2e1e2adaf5398c6801696d68e31b6f223ed1bfac108