Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
153s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28/03/2023, 16:55
Static task
static1
Behavioral task
behavioral1
Sample
lively_setup_x86_full_v2061.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
lively_setup_x86_full_v2061.exe
Resource
win10v2004-20230220-en
General
-
Target
lively_setup_x86_full_v2061.exe
-
Size
240.0MB
-
MD5
11b0b4ee9f599204d3e505a2f40f991c
-
SHA1
122ed6540b730674a2387091218e2eb4cd72bed1
-
SHA256
3991f4c4af685c2ff20ebfde2cbdebe27f4f468c11f036a5e3140b43605317c6
-
SHA512
56f7a3e456d159698f2361262f880738cd1e602df7dd68862fd0a71dbe4e6916445a7c2bcb72ab9b8390d01b561f59f589d276bd269fce8df54cbb154d475fb3
-
SSDEEP
6291456:IAmX0L8MUlmlp3wIk4x3PtYs6ylBSZdNQ74wtyEwvcv04d2:QXNMym3wIXx3PMylBgdi74wtyU0
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3932 lively_setup_x86_full_v2061.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2020 wrote to memory of 3932 2020 lively_setup_x86_full_v2061.exe 83 PID 2020 wrote to memory of 3932 2020 lively_setup_x86_full_v2061.exe 83 PID 2020 wrote to memory of 3932 2020 lively_setup_x86_full_v2061.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\lively_setup_x86_full_v2061.exe"C:\Users\Admin\AppData\Local\Temp\lively_setup_x86_full_v2061.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\is-4L07R.tmp\lively_setup_x86_full_v2061.tmp"C:\Users\Admin\AppData\Local\Temp\is-4L07R.tmp\lively_setup_x86_full_v2061.tmp" /SL5="$C005C,250540423,814592,C:\Users\Admin\AppData\Local\Temp\lively_setup_x86_full_v2061.exe"2⤵
- Executes dropped EXE
PID:3932
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.0MB
MD54bafa5da0557250ce0214242c59033c6
SHA18645cf99de9ddb8b4b0214bb10f9a9ccb83f8d82
SHA256428a2855c1277d72dfe3ff2089db9223f939188391d1412e45d7d6feb4c26e0b
SHA512b6aebebb9c995b2574bdc7c443dd86b7293a5c211a61973225e394754cd3dae7e1009cad22a09a1a220a6d14ca86d5dceb94d7220a9050d004ca91ff50b02dc1