Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
261s -
max time network
341s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 17:02
Static task
static1
Behavioral task
behavioral1
Sample
ad8153d9b927805f51ef1a24d737eabf355a9e083866a41e005c2a78b0fe66b6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ad8153d9b927805f51ef1a24d737eabf355a9e083866a41e005c2a78b0fe66b6.exe
Resource
win10v2004-20221111-en
General
-
Target
ad8153d9b927805f51ef1a24d737eabf355a9e083866a41e005c2a78b0fe66b6.exe
-
Size
257KB
-
MD5
dfa7d6fd67e10e2314f3cf455559b4f6
-
SHA1
7aaa290ff3a60116fe4bca3a105a5a714d610145
-
SHA256
ad8153d9b927805f51ef1a24d737eabf355a9e083866a41e005c2a78b0fe66b6
-
SHA512
b1745ac600fd9de4360b222fd61893685c3e1dce33bf2fd3b56fafbad0507d077a777c61a12903e2f0307e3ed238affaebde77c09d8e99bfe451947eb453c10b
-
SSDEEP
6144:91OgDPdkBAFZWjadD4s9sfs1Ev7bqNhfaOEO/Hk09sbwa:91OgLdaxTbqNhfaOEO/E0OMa
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3412 setup.exe -
NSIS installer 4 IoCs
resource yara_rule behavioral2/files/0x000200000001ff2d-133.dat nsis_installer_1 behavioral2/files/0x000200000001ff2d-133.dat nsis_installer_2 behavioral2/files/0x000200000001ff2d-134.dat nsis_installer_1 behavioral2/files/0x000200000001ff2d-134.dat nsis_installer_2 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2112 wrote to memory of 3412 2112 ad8153d9b927805f51ef1a24d737eabf355a9e083866a41e005c2a78b0fe66b6.exe 83 PID 2112 wrote to memory of 3412 2112 ad8153d9b927805f51ef1a24d737eabf355a9e083866a41e005c2a78b0fe66b6.exe 83 PID 2112 wrote to memory of 3412 2112 ad8153d9b927805f51ef1a24d737eabf355a9e083866a41e005c2a78b0fe66b6.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad8153d9b927805f51ef1a24d737eabf355a9e083866a41e005c2a78b0fe66b6.exe"C:\Users\Admin\AppData\Local\Temp\ad8153d9b927805f51ef1a24d737eabf355a9e083866a41e005c2a78b0fe66b6.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\7zSCF8B.tmp\setup.exe.\setup.exe /s2⤵
- Executes dropped EXE
PID:3412
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD54ccf1a317aa8539c857835e4ebe9c806
SHA1223b73d09d7398f40aff3ccc569e66cae3886ee9
SHA2564529889c5575cd4e28b3691f0489c806442840292a9e459ada4dab3e024cc242
SHA512ecab68799b5a51c7d2a3735a9b3c17ba20a315618aa9575a5b02d5d4535716966031a26982012669f069dbfd8a6ab62f95737b7c402bf680f3a498900f627312
-
Filesize
65KB
MD54ccf1a317aa8539c857835e4ebe9c806
SHA1223b73d09d7398f40aff3ccc569e66cae3886ee9
SHA2564529889c5575cd4e28b3691f0489c806442840292a9e459ada4dab3e024cc242
SHA512ecab68799b5a51c7d2a3735a9b3c17ba20a315618aa9575a5b02d5d4535716966031a26982012669f069dbfd8a6ab62f95737b7c402bf680f3a498900f627312