Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2023, 11:11
Static task
static1
Behavioral task
behavioral1
Sample
a1711052bbd63f86ec4975a87e92ddf2d93d501e888db46e49e122b26bfda176.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
a1711052bbd63f86ec4975a87e92ddf2d93d501e888db46e49e122b26bfda176.exe
Resource
win10v2004-20230915-en
General
-
Target
a1711052bbd63f86ec4975a87e92ddf2d93d501e888db46e49e122b26bfda176.exe
-
Size
5KB
-
MD5
6224917357d4920db89f09be59fc4aaa
-
SHA1
4bf62e8026c3680ce3ef84cb3e860dc96f11e81c
-
SHA256
a1711052bbd63f86ec4975a87e92ddf2d93d501e888db46e49e122b26bfda176
-
SHA512
8f62edb2589b6cf530b07fd85251fddf19f712c3471253305ea3fd20343375105949cc0bbb313b31acb6207d9321b05b607d9c524635c08f9d096e7b99ffe282
-
SSDEEP
96:WtHtXwSjvzTEEnLlzTiOrddcTrvvzBMNMrorQ:AtXfz4ERTiOr8kGorQ
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 4560 20231011T185215_922.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2696 wrote to memory of 2216 2696 a1711052bbd63f86ec4975a87e92ddf2d93d501e888db46e49e122b26bfda176.exe 99 PID 2696 wrote to memory of 2216 2696 a1711052bbd63f86ec4975a87e92ddf2d93d501e888db46e49e122b26bfda176.exe 99 PID 2216 wrote to memory of 4560 2216 cmd.exe 100 PID 2216 wrote to memory of 4560 2216 cmd.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\a1711052bbd63f86ec4975a87e92ddf2d93d501e888db46e49e122b26bfda176.exe"C:\Users\Admin\AppData\Local\Temp\a1711052bbd63f86ec4975a87e92ddf2d93d501e888db46e49e122b26bfda176.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\20231011T185215_922.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\20231011T185215_922.exeC:\Users\Admin\AppData\Local\Temp\20231011T185215_922.exe3⤵
- Executes dropped EXE
PID:4560
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5ca94a470b71155277307588cf5f0e8d0
SHA1de6a73a37ce489b3edaa7a6e47bf1737dfb53243
SHA25696bca4cf78284c3206ffaf27b133aae6968cee872d460f9e8351c6bf36569df2
SHA512a42036027e7d170b5162393a1ec696556957aa2fe4a1082935f8dbb8359440b9c298a221a80c1287aa47d089288611b5d99c2fc8c471390c53be94509c8794df
-
Filesize
5KB
MD5ca94a470b71155277307588cf5f0e8d0
SHA1de6a73a37ce489b3edaa7a6e47bf1737dfb53243
SHA25696bca4cf78284c3206ffaf27b133aae6968cee872d460f9e8351c6bf36569df2
SHA512a42036027e7d170b5162393a1ec696556957aa2fe4a1082935f8dbb8359440b9c298a221a80c1287aa47d089288611b5d99c2fc8c471390c53be94509c8794df
-
Filesize
5KB
MD5ca94a470b71155277307588cf5f0e8d0
SHA1de6a73a37ce489b3edaa7a6e47bf1737dfb53243
SHA25696bca4cf78284c3206ffaf27b133aae6968cee872d460f9e8351c6bf36569df2
SHA512a42036027e7d170b5162393a1ec696556957aa2fe4a1082935f8dbb8359440b9c298a221a80c1287aa47d089288611b5d99c2fc8c471390c53be94509c8794df