Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231025-en -
resource tags
arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system -
submitted
30/10/2023, 07:36
Static task
static1
Behavioral task
behavioral1
Sample
3116a5fe94a456d3a005fbf1bd6b0ba7b518e4bc217442d09a45764efde2acc4.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
3116a5fe94a456d3a005fbf1bd6b0ba7b518e4bc217442d09a45764efde2acc4.exe
Resource
win10v2004-20231025-en
General
-
Target
3116a5fe94a456d3a005fbf1bd6b0ba7b518e4bc217442d09a45764efde2acc4.exe
-
Size
816KB
-
MD5
f65810f9cc64599bf0284532cd69abdb
-
SHA1
2624d27abd05a355ee02815155c7c60880ea6ac3
-
SHA256
3116a5fe94a456d3a005fbf1bd6b0ba7b518e4bc217442d09a45764efde2acc4
-
SHA512
f44997c2e1d8999f886bcff9e85b32a475814bdc35647633e5e79253663a362d41283348cd6b2c2cb83edf93706995cb4ee2c18b29670a96ab9bbb891c5a7d11
-
SSDEEP
24576:fY4G2qLMJalsnqShyoo77lUabuSvbDQOOdIxJsG97:w3XZynV4oDabuWbDQOcIxJJ97
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4080 1A0E0E0C120F156A155B15E0C0F160E0F160B.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1776 3116a5fe94a456d3a005fbf1bd6b0ba7b518e4bc217442d09a45764efde2acc4.exe 4080 1A0E0E0C120F156A155B15E0C0F160E0F160B.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1776 wrote to memory of 4080 1776 3116a5fe94a456d3a005fbf1bd6b0ba7b518e4bc217442d09a45764efde2acc4.exe 88 PID 1776 wrote to memory of 4080 1776 3116a5fe94a456d3a005fbf1bd6b0ba7b518e4bc217442d09a45764efde2acc4.exe 88 PID 1776 wrote to memory of 4080 1776 3116a5fe94a456d3a005fbf1bd6b0ba7b518e4bc217442d09a45764efde2acc4.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\3116a5fe94a456d3a005fbf1bd6b0ba7b518e4bc217442d09a45764efde2acc4.exe"C:\Users\Admin\AppData\Local\Temp\3116a5fe94a456d3a005fbf1bd6b0ba7b518e4bc217442d09a45764efde2acc4.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\1A0E0E0C120F156A155B15E0C0F160E0F160B.exeC:\Users\Admin\AppData\Local\Temp\1A0E0E0C120F156A155B15E0C0F160E0F160B.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4080
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
816KB
MD5217442a650887e59b9c1c2bf58e3176a
SHA1caf0b2f41d99eeea02738475913259f5f543090b
SHA25638da65a006855728d17f20ef599f077031363a1d44c3f13185829e8568ed13ba
SHA512b15c97bbf7e7cd5cfbd39a1f834124f976b099f20502243e22852faad1b1c145e29f3e1135e26882aeabbc67272b05754d90db02d98c4f3feb6da7fe1bf80d20
-
Filesize
816KB
MD5217442a650887e59b9c1c2bf58e3176a
SHA1caf0b2f41d99eeea02738475913259f5f543090b
SHA25638da65a006855728d17f20ef599f077031363a1d44c3f13185829e8568ed13ba
SHA512b15c97bbf7e7cd5cfbd39a1f834124f976b099f20502243e22852faad1b1c145e29f3e1135e26882aeabbc67272b05754d90db02d98c4f3feb6da7fe1bf80d20