Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    115s
  • max time network
    187s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/10/2023, 13:54

General

  • Target

    bddc550e51cad77d4c489d6fe2db177d_JC.exe

  • Size

    72KB

  • MD5

    bddc550e51cad77d4c489d6fe2db177d

  • SHA1

    71c6936c63a1dc0a0748fa271537327f822c2227

  • SHA256

    6569b866a8663b22acaf7f3aacdcc39fe756ebb54221de484db7307fff280614

  • SHA512

    876b8835c67467629d7ff1c35a30aafdd750b7d62d0cc356a4e634bd3132854299af5d02dd6eef3fe1037350c3c6522635608a178c5cf10ab7e69fc3f64a4e0a

  • SSDEEP

    768:TYnI9ZvPg2k4u+hJDdv260OAhAH4Ii7gLp6uqcl2aauA:TwIrHuCtd3FAhAYIi7Glba

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bddc550e51cad77d4c489d6fe2db177d_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\bddc550e51cad77d4c489d6fe2db177d_JC.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2776
    • C:\Users\Admin\AppData\Roaming\4pjjqx8.exe
      C:\Users\Admin\AppData\Roaming\4pjjqx8.exe
      2⤵
      • Executes dropped EXE
      PID:1984

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\4pjjqx8.exe

    Filesize

    72KB

    MD5

    e65e6b954d3f6e5df07ffc5839222b53

    SHA1

    c9e7f7f8dc0a027f91227baba992cef28dff2c93

    SHA256

    10bfd28ff5afea16415e9e5faff8cfa78844b974e9db42b02145947850f777e5

    SHA512

    a8c6825983dafdd46663c6737e704cf653d07be1a8dc1cb63c7b423b0c08c5074139a626973d797a254a0f3705fccd43365820ae1e914853b3f6d92675315bb2

  • C:\Users\Admin\AppData\Roaming\4pjjqx8.exe

    Filesize

    72KB

    MD5

    e65e6b954d3f6e5df07ffc5839222b53

    SHA1

    c9e7f7f8dc0a027f91227baba992cef28dff2c93

    SHA256

    10bfd28ff5afea16415e9e5faff8cfa78844b974e9db42b02145947850f777e5

    SHA512

    a8c6825983dafdd46663c6737e704cf653d07be1a8dc1cb63c7b423b0c08c5074139a626973d797a254a0f3705fccd43365820ae1e914853b3f6d92675315bb2