Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2023, 06:53
Static task
static1
Behavioral task
behavioral1
Sample
e4365b048b21caexeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
e4365b048b21caexeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
e4365b048b21caexeexeexeex.exe
-
Size
428KB
-
MD5
e4365b048b21ca1cf9c524685b1bf16a
-
SHA1
f23707fbafd285488d6d21b0ddc4ceb6015d50bd
-
SHA256
7c497941f9f425c2369793153327b4eb6aabce1dd42c7005f052db6247e898e2
-
SHA512
fd715bde6131f597d854a6d84b457ea8cea1a5ae2e2888e16ed7f3502b62d0402b26abb982e992913e6951826a760370d3bcc98732b64c82a1086810efc94fb5
-
SSDEEP
12288:Z594+AcL4tBekiuKzErAFc4LaJuk4TEwyXWFVPl:BL4tBekiuVrAFxLKuk0nnFVP
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3580 9536.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4156 wrote to memory of 3580 4156 e4365b048b21caexeexeexeex.exe 85 PID 4156 wrote to memory of 3580 4156 e4365b048b21caexeexeexeex.exe 85 PID 4156 wrote to memory of 3580 4156 e4365b048b21caexeexeexeex.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\e4365b048b21caexeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\e4365b048b21caexeexeexeex.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Users\Admin\AppData\Local\Temp\9536.tmp"C:\Users\Admin\AppData\Local\Temp\9536.tmp" --helpC:\Users\Admin\AppData\Local\Temp\e4365b048b21caexeexeexeex.exe DA484449141322D1DBA7D61C5935CD6A09DE374DA712B2CC9179904EE80F44DFC79D29DE937F9272FBD25309A1B0D05758B8D0A9E879AB6BBCF79C4E35DEC5442⤵
- Executes dropped EXE
PID:3580
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
428KB
MD595398e8492e11768ab530baf8088a477
SHA1636e088cba1e8e24f9fb029a4a393b4ef6387f86
SHA25672e50786c59178ded7c307e9a96c700b99d6e69a1ee23fd55275de64f89b2086
SHA5122aeb309d95e5eade35bca10fb203b8314a394f1c2007837796db4357fb32128dd8a5cffc7f8e5d3b39e8bccd2caad6f20a61f8704edfaa5966444eb34b028765
-
Filesize
428KB
MD595398e8492e11768ab530baf8088a477
SHA1636e088cba1e8e24f9fb029a4a393b4ef6387f86
SHA25672e50786c59178ded7c307e9a96c700b99d6e69a1ee23fd55275de64f89b2086
SHA5122aeb309d95e5eade35bca10fb203b8314a394f1c2007837796db4357fb32128dd8a5cffc7f8e5d3b39e8bccd2caad6f20a61f8704edfaa5966444eb34b028765