Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
30/09/2023, 16:20
Static task
static1
Behavioral task
behavioral1
Sample
24893d4537c10cebdf8f350370724a4bbc4b87d87e500f68559719db9e93b362.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
24893d4537c10cebdf8f350370724a4bbc4b87d87e500f68559719db9e93b362.exe
Resource
win10v2004-20230915-en
General
-
Target
24893d4537c10cebdf8f350370724a4bbc4b87d87e500f68559719db9e93b362.exe
-
Size
812KB
-
MD5
5bcbb66ee5d43865205f0469f72b87e8
-
SHA1
70d95b3bdde68cb9fd3666612f383a60eba2d860
-
SHA256
24893d4537c10cebdf8f350370724a4bbc4b87d87e500f68559719db9e93b362
-
SHA512
404060af7f411010be572a64aef1b860bfd8929df8834a2df8935ec826ca6757f5027771d78adf46641938713efe15faf5bcde4088e7c22fb4d95956f33ac350
-
SSDEEP
12288:VqmytVdB0rPEDb3kCoI641jxy7GHEX2rnAv8MktrOKxp22CMOZ/1Sq:VqxtVfNDb31oT41+aneOrO4p2zMOZ/V
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4088 1F0D0C0B120E156B155B15E0E0B160D0D160D.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4792 24893d4537c10cebdf8f350370724a4bbc4b87d87e500f68559719db9e93b362.exe 4088 1F0D0C0B120E156B155B15E0E0B160D0D160D.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4792 wrote to memory of 4088 4792 24893d4537c10cebdf8f350370724a4bbc4b87d87e500f68559719db9e93b362.exe 85 PID 4792 wrote to memory of 4088 4792 24893d4537c10cebdf8f350370724a4bbc4b87d87e500f68559719db9e93b362.exe 85 PID 4792 wrote to memory of 4088 4792 24893d4537c10cebdf8f350370724a4bbc4b87d87e500f68559719db9e93b362.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\24893d4537c10cebdf8f350370724a4bbc4b87d87e500f68559719db9e93b362.exe"C:\Users\Admin\AppData\Local\Temp\24893d4537c10cebdf8f350370724a4bbc4b87d87e500f68559719db9e93b362.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Users\Admin\AppData\Local\Temp\1F0D0C0B120E156B155B15E0E0B160D0D160D.exeC:\Users\Admin\AppData\Local\Temp\1F0D0C0B120E156B155B15E0E0B160D0D160D.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4088
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
812KB
MD587dd378cf8b7e3f51dcfb28694e49d30
SHA16a05d257982f83fde6dd1f62c673f9994d0440e0
SHA2562c7dd3198d1730c54e524c5f37fe135139a81166de3021aa06c915c23922e6fa
SHA51201ca3ed36bae91f702dffdab44258225e219acd04f2069abee75a42c3d7925a48fa89f61f366f18847967fff8355d4e56ea4beacf0d02ae47d3031e921382773
-
Filesize
812KB
MD587dd378cf8b7e3f51dcfb28694e49d30
SHA16a05d257982f83fde6dd1f62c673f9994d0440e0
SHA2562c7dd3198d1730c54e524c5f37fe135139a81166de3021aa06c915c23922e6fa
SHA51201ca3ed36bae91f702dffdab44258225e219acd04f2069abee75a42c3d7925a48fa89f61f366f18847967fff8355d4e56ea4beacf0d02ae47d3031e921382773