Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
124s -
max time network
255s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
25/08/2023, 04:47
Static task
static1
Behavioral task
behavioral1
Sample
84630d3a3fce1c6a424a0a13f645fb995cb69c0829c4dde384806d08a6f8e94b.exe
Resource
win7-20230824-en
Behavioral task
behavioral2
Sample
84630d3a3fce1c6a424a0a13f645fb995cb69c0829c4dde384806d08a6f8e94b.exe
Resource
win10-20230703-en
General
-
Target
84630d3a3fce1c6a424a0a13f645fb995cb69c0829c4dde384806d08a6f8e94b.exe
-
Size
1.6MB
-
MD5
7db9dd5aa17476727fa4321088a26fc3
-
SHA1
798e8db4d86bc714553ee5b715a2e49ae14887cc
-
SHA256
84630d3a3fce1c6a424a0a13f645fb995cb69c0829c4dde384806d08a6f8e94b
-
SHA512
0b0e9bd7f45e0ed282058119e68c71f8d6b5ed35b573bd4969770dc8d845de1a3fdc834e7fa5ce98bbc1355b9797acd7ba3e2676d2019e1ea1fcdf8b5481ef7b
-
SSDEEP
49152:PRGqZwl190Zh2FotehTNa63fQfslf8j/:U0Zh2qtehQF
Malware Config
Signatures
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1508 set thread context of 2672 1508 84630d3a3fce1c6a424a0a13f645fb995cb69c0829c4dde384806d08a6f8e94b.exe 55 -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 2672 AppLaunch.exe 2672 AppLaunch.exe 2672 AppLaunch.exe 2672 AppLaunch.exe 2672 AppLaunch.exe 2672 AppLaunch.exe 2672 AppLaunch.exe 2672 AppLaunch.exe 2672 AppLaunch.exe 2672 AppLaunch.exe 2672 AppLaunch.exe 2672 AppLaunch.exe 2672 AppLaunch.exe 2672 AppLaunch.exe 2672 AppLaunch.exe 2672 AppLaunch.exe 2672 AppLaunch.exe 2672 AppLaunch.exe 2672 AppLaunch.exe 2672 AppLaunch.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1508 wrote to memory of 2672 1508 84630d3a3fce1c6a424a0a13f645fb995cb69c0829c4dde384806d08a6f8e94b.exe 55 PID 1508 wrote to memory of 2672 1508 84630d3a3fce1c6a424a0a13f645fb995cb69c0829c4dde384806d08a6f8e94b.exe 55 PID 1508 wrote to memory of 2672 1508 84630d3a3fce1c6a424a0a13f645fb995cb69c0829c4dde384806d08a6f8e94b.exe 55 PID 1508 wrote to memory of 2672 1508 84630d3a3fce1c6a424a0a13f645fb995cb69c0829c4dde384806d08a6f8e94b.exe 55 PID 1508 wrote to memory of 2672 1508 84630d3a3fce1c6a424a0a13f645fb995cb69c0829c4dde384806d08a6f8e94b.exe 55 PID 1508 wrote to memory of 2672 1508 84630d3a3fce1c6a424a0a13f645fb995cb69c0829c4dde384806d08a6f8e94b.exe 55 PID 1508 wrote to memory of 2672 1508 84630d3a3fce1c6a424a0a13f645fb995cb69c0829c4dde384806d08a6f8e94b.exe 55 PID 1508 wrote to memory of 2672 1508 84630d3a3fce1c6a424a0a13f645fb995cb69c0829c4dde384806d08a6f8e94b.exe 55 PID 1508 wrote to memory of 2672 1508 84630d3a3fce1c6a424a0a13f645fb995cb69c0829c4dde384806d08a6f8e94b.exe 55
Processes
-
C:\Users\Admin\AppData\Local\Temp\84630d3a3fce1c6a424a0a13f645fb995cb69c0829c4dde384806d08a6f8e94b.exe"C:\Users\Admin\AppData\Local\Temp\84630d3a3fce1c6a424a0a13f645fb995cb69c0829c4dde384806d08a6f8e94b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2672
-