Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    136s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/01/2023, 19:03

General

  • Target

    9ef1c47ac7349f1f7c052ce54767a8fe0ff21f41b68e40261e41b351d3a1ddf6.exe

  • Size

    1.1MB

  • MD5

    9145885c6226cbd9f18c472e4ac0a4e3

  • SHA1

    24fa80c373b83e0dffb87da409f1c312e0eaf5ff

  • SHA256

    9ef1c47ac7349f1f7c052ce54767a8fe0ff21f41b68e40261e41b351d3a1ddf6

  • SHA512

    c713028f419046dac9c1a85a39688f54a6f6692b475e29815617a8540340a304c1705138668880e6f0fa74c51debb278c33b0bb708a87798d4aa5a003cd66a5c

  • SSDEEP

    24576:mPDJSb3ewHdqoXpDqDehBgLtQjC4qK3YDPIQSxFL:mPDJSb/qehyLy+4xIDPvSxFL

Score
10/10

Malware Config

Signatures

  • DarkCloud

    An information stealer written in Visual Basic.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9ef1c47ac7349f1f7c052ce54767a8fe0ff21f41b68e40261e41b351d3a1ddf6.exe
    "C:\Users\Admin\AppData\Local\Temp\9ef1c47ac7349f1f7c052ce54767a8fe0ff21f41b68e40261e41b351d3a1ddf6.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4572
    • C:\Users\Admin\AppData\Local\Temp\9ef1c47ac7349f1f7c052ce54767a8fe0ff21f41b68e40261e41b351d3a1ddf6.exe
      "C:\Users\Admin\AppData\Local\Temp\9ef1c47ac7349f1f7c052ce54767a8fe0ff21f41b68e40261e41b351d3a1ddf6.exe"
      2⤵
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:2172

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2172-138-0x0000000000400000-0x0000000000476000-memory.dmp

    Filesize

    472KB

  • memory/2172-140-0x0000000000400000-0x0000000000476000-memory.dmp

    Filesize

    472KB

  • memory/2172-143-0x0000000000400000-0x0000000000476000-memory.dmp

    Filesize

    472KB

  • memory/2172-144-0x0000000000400000-0x0000000000476000-memory.dmp

    Filesize

    472KB

  • memory/4572-132-0x0000000000D20000-0x0000000000E4C000-memory.dmp

    Filesize

    1.2MB

  • memory/4572-133-0x0000000005BC0000-0x0000000006164000-memory.dmp

    Filesize

    5.6MB

  • memory/4572-134-0x00000000056B0000-0x0000000005742000-memory.dmp

    Filesize

    584KB

  • memory/4572-135-0x0000000005760000-0x000000000576A000-memory.dmp

    Filesize

    40KB

  • memory/4572-136-0x00000000059A0000-0x0000000005A3C000-memory.dmp

    Filesize

    624KB