Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    134s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/01/2023, 18:27

General

  • Target

    df4b7b09b65c9d90a42c15ffc967fd067494d3b61f15626ea5f710eaa24101bc.exe

  • Size

    14.4MB

  • MD5

    602b0df02ad09d34291aef9e9a8c7fc8

  • SHA1

    449153712c2bd177fd7ddbfed065eb730081cdc1

  • SHA256

    df4b7b09b65c9d90a42c15ffc967fd067494d3b61f15626ea5f710eaa24101bc

  • SHA512

    98e803b68551b49dbc23a3d9e05e4c94b57c407c1580a377a68fb5d6a0571d35184449cce6976a527c05b39eb0275881a28a73c463cf0872d9c6f042fc3dbe36

  • SSDEEP

    393216:rW1gSgpns/NIrRo0txyaIysVTof18S/PvWpiWJ96O:rNSgxrdXKa7v0FJUO

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\df4b7b09b65c9d90a42c15ffc967fd067494d3b61f15626ea5f710eaa24101bc.exe
    "C:\Users\Admin\AppData\Local\Temp\df4b7b09b65c9d90a42c15ffc967fd067494d3b61f15626ea5f710eaa24101bc.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3464
    • C:\Users\Admin\AppData\Local\Temp\is-IAP59.tmp\df4b7b09b65c9d90a42c15ffc967fd067494d3b61f15626ea5f710eaa24101bc.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-IAP59.tmp\df4b7b09b65c9d90a42c15ffc967fd067494d3b61f15626ea5f710eaa24101bc.tmp" /SL5="$8005E,14870178,58368,C:\Users\Admin\AppData\Local\Temp\df4b7b09b65c9d90a42c15ffc967fd067494d3b61f15626ea5f710eaa24101bc.exe"
      2⤵
      • Executes dropped EXE
      PID:4736

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-IAP59.tmp\df4b7b09b65c9d90a42c15ffc967fd067494d3b61f15626ea5f710eaa24101bc.tmp

    Filesize

    706KB

    MD5

    a305877eabf2c8d30cd5df98345952ae

    SHA1

    c0518290145415e66f9f1b9a9c3c1b3e346a10fa

    SHA256

    8558efadf63fb12cf3ddacccfe07d397f2f902efadc4adf679a7e5c27cd49d76

    SHA512

    6f22868d451f3f07fdaa096b303a480fb9f5f9bd4675046bba79b9c15435892ea07b3ef5f3a3788144af696a675c2d4639ab4396e22761923c955747463b9fad

  • C:\Users\Admin\AppData\Local\Temp\is-IAP59.tmp\df4b7b09b65c9d90a42c15ffc967fd067494d3b61f15626ea5f710eaa24101bc.tmp

    Filesize

    706KB

    MD5

    a305877eabf2c8d30cd5df98345952ae

    SHA1

    c0518290145415e66f9f1b9a9c3c1b3e346a10fa

    SHA256

    8558efadf63fb12cf3ddacccfe07d397f2f902efadc4adf679a7e5c27cd49d76

    SHA512

    6f22868d451f3f07fdaa096b303a480fb9f5f9bd4675046bba79b9c15435892ea07b3ef5f3a3788144af696a675c2d4639ab4396e22761923c955747463b9fad

  • memory/3464-132-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/3464-137-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/3464-138-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB