Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
190s -
max time network
196s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
04/12/2022, 02:36
Static task
static1
Behavioral task
behavioral1
Sample
a9c3940f167e232dc4619f922dfe7f71327a138621e42085059222bf723772d4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a9c3940f167e232dc4619f922dfe7f71327a138621e42085059222bf723772d4.exe
Resource
win10v2004-20221111-en
General
-
Target
a9c3940f167e232dc4619f922dfe7f71327a138621e42085059222bf723772d4.exe
-
Size
697KB
-
MD5
20b7cf6316fd13fbfea6c89484a1f760
-
SHA1
2d6f4d5f2b703f285a9ff2e221815f6da9a1d5ac
-
SHA256
a9c3940f167e232dc4619f922dfe7f71327a138621e42085059222bf723772d4
-
SHA512
306e8533cfa09e4ba8f03a1cd193ee9ac545d3f04a378804caefa41e5defa79552c559b71d3a4d4c29b2a9e6d0c89abe5c87b75d424b5d4c6ad9e673aec89b28
-
SSDEEP
12288:brwMz6qwEW6I7icWJE/czSHx2wIY/Q1KGgDU2sa7pkxIPnUsBxKNAndWXrGX0:wMwEWr7Cm/czQxJGgDea7pk2nUWKNNyE
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 836 sxe21D3.tmp -
Loads dropped DLL 2 IoCs
pid Process 1072 a9c3940f167e232dc4619f922dfe7f71327a138621e42085059222bf723772d4.exe 1072 a9c3940f167e232dc4619f922dfe7f71327a138621e42085059222bf723772d4.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 836 sxe21D3.tmp 836 sxe21D3.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1072 wrote to memory of 836 1072 a9c3940f167e232dc4619f922dfe7f71327a138621e42085059222bf723772d4.exe 83 PID 1072 wrote to memory of 836 1072 a9c3940f167e232dc4619f922dfe7f71327a138621e42085059222bf723772d4.exe 83 PID 1072 wrote to memory of 836 1072 a9c3940f167e232dc4619f922dfe7f71327a138621e42085059222bf723772d4.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\a9c3940f167e232dc4619f922dfe7f71327a138621e42085059222bf723772d4.exe"C:\Users\Admin\AppData\Local\Temp\a9c3940f167e232dc4619f922dfe7f71327a138621e42085059222bf723772d4.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Users\Admin\AppData\Local\Temp\sxe21D3.tmp"C:\Users\Admin\AppData\Local\Temp\sxe21D3.tmp"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:836
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD5bd815b61f9948f93aface4033fbb4423
SHA1b5391484009b39053fc8b1bba63d444969bafcfa
SHA256b018bf9e9f8b6d945e6a2a25984970634884afabc580af2b4e855730520d5d76
SHA512a363abe97b5a44e5d36af859e8d484daffe1d8e321c87969a75d1bfaa4288a5e6be1922a02c6d72937c84e81a79a1c7f6c9f2a44a995cac3f993ed5608afcd71
-
Filesize
15KB
MD5bd815b61f9948f93aface4033fbb4423
SHA1b5391484009b39053fc8b1bba63d444969bafcfa
SHA256b018bf9e9f8b6d945e6a2a25984970634884afabc580af2b4e855730520d5d76
SHA512a363abe97b5a44e5d36af859e8d484daffe1d8e321c87969a75d1bfaa4288a5e6be1922a02c6d72937c84e81a79a1c7f6c9f2a44a995cac3f993ed5608afcd71
-
Filesize
1.3MB
MD5aebdbc81cacdc10964fbb98ef935d385
SHA1199721ab9936bd6db39ff86522079dcc77b19b22
SHA2565ee630dc7fcb5d253cb7381f949e86b3693da8d37fb68e2e94d3b8a088aba0d8
SHA5123df261c0368b1d5bc2cfec263558d2aae38201278232a252ff82182dff45d9f55422590f89ed3f579a4f36e1d38cef4cde0ace8e0bdf0dca3fa3d8bc61591193
-
Filesize
1.3MB
MD5aebdbc81cacdc10964fbb98ef935d385
SHA1199721ab9936bd6db39ff86522079dcc77b19b22
SHA2565ee630dc7fcb5d253cb7381f949e86b3693da8d37fb68e2e94d3b8a088aba0d8
SHA5123df261c0368b1d5bc2cfec263558d2aae38201278232a252ff82182dff45d9f55422590f89ed3f579a4f36e1d38cef4cde0ace8e0bdf0dca3fa3d8bc61591193