Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

23/08/2023, 07:25

230823-h83ngsae64 5

23/08/2023, 05:11

230823-ft9r5sbd3x 5

23/08/2023, 04:47

230823-fevdxabc7x 5

Analysis

  • max time kernel
    1691s
  • max time network
    1161s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/08/2023, 07:25

General

  • Target

    cc4486d3417745208f8e576ad7d37af7fc208ec1b39803b8fe81790354b43393.exe

  • Size

    1.9MB

  • MD5

    003c5ac9c36f5246b14f296a76665e9c

  • SHA1

    e56b0ad93e6f1779bd446fdc611878b4f267b924

  • SHA256

    cc4486d3417745208f8e576ad7d37af7fc208ec1b39803b8fe81790354b43393

  • SHA512

    047f3bba20bc8c7774e87c93216a26d9e40cfad188e728702e7da3d52e6e9237156de6186684a59024e4d23e917c9e203286d6fe7d476e08bb395861f1e56d87

  • SSDEEP

    24576:W64knz8loIpUgIgNvsW6hr6r+mMWfwrMFGOtDEn9aJfRYYD1R/dc0zFD2ShsrMvj:Xnz1gLvsWvrcutDaYD1ZdSSyrK7

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cc4486d3417745208f8e576ad7d37af7fc208ec1b39803b8fe81790354b43393.exe
    "C:\Users\Admin\AppData\Local\Temp\cc4486d3417745208f8e576ad7d37af7fc208ec1b39803b8fe81790354b43393.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2200
    • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\ADelRCP.exe
      "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\ADelRCP.exe"
      2⤵
        PID:4180

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2200-142-0x0000000000CE0000-0x0000000000EFE000-memory.dmp

      Filesize

      2.1MB

    • memory/4180-133-0x0000000000140000-0x000000000014F000-memory.dmp

      Filesize

      60KB

    • memory/4180-134-0x0000000000140000-0x000000000014F000-memory.dmp

      Filesize

      60KB

    • memory/4180-137-0x0000000000140000-0x000000000014F000-memory.dmp

      Filesize

      60KB

    • memory/4180-140-0x0000000000140000-0x000000000014F000-memory.dmp

      Filesize

      60KB

    • memory/4180-141-0x0000000000140000-0x000000000014F000-memory.dmp

      Filesize

      60KB

    • memory/4180-144-0x0000000000530000-0x0000000000531000-memory.dmp

      Filesize

      4KB

    • memory/4180-145-0x0000000000140000-0x000000000014F000-memory.dmp

      Filesize

      60KB

    • memory/4180-143-0x0000000000140000-0x000000000014F000-memory.dmp

      Filesize

      60KB

    • memory/4180-148-0x0000000000140000-0x000000000014F000-memory.dmp

      Filesize

      60KB

    • memory/4180-149-0x0000000000140000-0x000000000014F000-memory.dmp

      Filesize

      60KB