Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 00:29
Static task
static1
Behavioral task
behavioral1
Sample
c415dfa339ff10b698d50c4ba6b47285f95e035172b2571b6ed49a80ea26a227.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c415dfa339ff10b698d50c4ba6b47285f95e035172b2571b6ed49a80ea26a227.exe
Resource
win10v2004-20220812-en
General
-
Target
c415dfa339ff10b698d50c4ba6b47285f95e035172b2571b6ed49a80ea26a227.exe
-
Size
135KB
-
MD5
42571f9f491ba1d03df21c7e43736efa
-
SHA1
c1e804e94f6863fc68b4e7b8f360226d8ae7869b
-
SHA256
c415dfa339ff10b698d50c4ba6b47285f95e035172b2571b6ed49a80ea26a227
-
SHA512
f4ec4acdc24558a33a340220acbda17c501365cfdbbd940702914debb1af8397573438f6677fe228316b43efb3efb237e1c4acbd6e9ae03ab988332e612ac39c
-
SSDEEP
3072:rIxWnURa1S+RPn4L4ynf+upZrRWNY2lh8wrbout:rIgUKRP8mup5RWgwrboS
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2132 msprxysvc32.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\msprxysvc32.exe c415dfa339ff10b698d50c4ba6b47285f95e035172b2571b6ed49a80ea26a227.exe File opened for modification C:\Windows\SysWOW64\msprxysvc32.exe c415dfa339ff10b698d50c4ba6b47285f95e035172b2571b6ed49a80ea26a227.exe File opened for modification C:\Windows\SysWOW64\msprxysvc32.exe msprxysvc32.exe File created C:\Windows\SysWOW64\msprxysvc32.exe msprxysvc32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4676 wrote to memory of 2132 4676 c415dfa339ff10b698d50c4ba6b47285f95e035172b2571b6ed49a80ea26a227.exe 79 PID 4676 wrote to memory of 2132 4676 c415dfa339ff10b698d50c4ba6b47285f95e035172b2571b6ed49a80ea26a227.exe 79 PID 4676 wrote to memory of 2132 4676 c415dfa339ff10b698d50c4ba6b47285f95e035172b2571b6ed49a80ea26a227.exe 79 PID 2132 wrote to memory of 620 2132 msprxysvc32.exe 81 PID 2132 wrote to memory of 620 2132 msprxysvc32.exe 81 PID 2132 wrote to memory of 620 2132 msprxysvc32.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\c415dfa339ff10b698d50c4ba6b47285f95e035172b2571b6ed49a80ea26a227.exe"C:\Users\Admin\AppData\Local\Temp\c415dfa339ff10b698d50c4ba6b47285f95e035172b2571b6ed49a80ea26a227.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Windows\SysWOW64\msprxysvc32.exeC:\Windows\system32\msprxysvc32.exe 1152 "C:\Users\Admin\AppData\Local\Temp\c415dfa339ff10b698d50c4ba6b47285f95e035172b2571b6ed49a80ea26a227.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\del.bat C:\Windows\SysWOW64\msprxysvc32.exe3⤵PID:620
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136B
MD5bfcf9cc6d1c37953dfa43312e2c36140
SHA107a4c0f29b282c34be24c312c4b920e479f4cee0
SHA256bac7cce52aeba3a2e2ce2bb6aebf50ffa65530d0d51ca49a2abc7f4e43ce3ce5
SHA512fb661474557e7168d4050607863b57649fa12a26ab9bd06078ae3254d003d76cfed4eac3d0a78a56eaf0ecc5b231d52788b6c8688cb14b0c86a37efe90f5f53a
-
Filesize
135KB
MD542571f9f491ba1d03df21c7e43736efa
SHA1c1e804e94f6863fc68b4e7b8f360226d8ae7869b
SHA256c415dfa339ff10b698d50c4ba6b47285f95e035172b2571b6ed49a80ea26a227
SHA512f4ec4acdc24558a33a340220acbda17c501365cfdbbd940702914debb1af8397573438f6677fe228316b43efb3efb237e1c4acbd6e9ae03ab988332e612ac39c
-
Filesize
135KB
MD542571f9f491ba1d03df21c7e43736efa
SHA1c1e804e94f6863fc68b4e7b8f360226d8ae7869b
SHA256c415dfa339ff10b698d50c4ba6b47285f95e035172b2571b6ed49a80ea26a227
SHA512f4ec4acdc24558a33a340220acbda17c501365cfdbbd940702914debb1af8397573438f6677fe228316b43efb3efb237e1c4acbd6e9ae03ab988332e612ac39c