Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/12/2023, 06:30

General

  • Target

    75fbd9ac1fc1fb395c4f26e845803fbd.exe

  • Size

    787KB

  • MD5

    75fbd9ac1fc1fb395c4f26e845803fbd

  • SHA1

    5f7e04cf10d4eae95b041cde85a0c268502b8436

  • SHA256

    c0c9e2acb985a0115c7cc956dc4566e628ada43c257355623d0533ba398d0a19

  • SHA512

    7235a66f987b70948f48921a4ab0f33545fd53cb84e4c8361eb2922be7993db142c6a605a57d23170e628745a87e5548e6158ea0dd40495a25db650d1d977199

  • SSDEEP

    24576:qKeyxTAJj7P+yW6mc1YN1ChWrKFhTkDvIj6k7DS:qKeyRA0y9fWN1ChWePDj6k/S

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\75fbd9ac1fc1fb395c4f26e845803fbd.exe
    "C:\Users\Admin\AppData\Local\Temp\75fbd9ac1fc1fb395c4f26e845803fbd.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:2256
    • C:\Program Files (x86)\abhr\jehrrgmfemqu.exe
      "C:\Program Files (x86)\abhr\jehrrgmfemqu.exe"
      2⤵
      • Executes dropped EXE
      PID:3760

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\abhr\jehrrgmfemqu.exe

    Filesize

    216KB

    MD5

    23ea30c6c60e8473e50df584d09aad1d

    SHA1

    d985cd40e96f9ac1a230c992726109bec5892439

    SHA256

    794745f22c67ddde9d01c0aaac8d058c3a46dd3d38cb8765e31110a53c0331d0

    SHA512

    34cf58d5dbd0fab0b1035fdfeafa0b66e278a6cb911785fbbe058dbc57f2f96a15e0ae00538d31fc5ba89165451d011efcb6e7446cd6bb74b2469ed6d537f721

  • C:\Program Files (x86)\abhr\jehrrgmfemqu.exe

    Filesize

    110KB

    MD5

    e76dcf0e699f02566d2381c40bef0111

    SHA1

    59e87e894998cf273fd32688f88a23db0db311bb

    SHA256

    f4ee5aeab543c1fdc239958ca775ee875e4e9ebe9355adbf598f745ccf6ec920

    SHA512

    4c864a33a2df428445f9a2f56fb3e4b8a0eccecb059321c8d1ffe452b5df56294de99f5a512e2b35431fea1b9c3fc622d6a277b4a6c817275f5d06a2c39c2d01

  • memory/2256-0-0x0000000000400000-0x0000000000494000-memory.dmp

    Filesize

    592KB

  • memory/2256-6-0x0000000000400000-0x0000000000494000-memory.dmp

    Filesize

    592KB

  • memory/2256-1-0x0000000000400000-0x0000000000494000-memory.dmp

    Filesize

    592KB

  • memory/3760-9-0x0000000000400000-0x0000000000494000-memory.dmp

    Filesize

    592KB

  • memory/3760-8-0x0000000000400000-0x0000000000494000-memory.dmp

    Filesize

    592KB