Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2023, 06:30
Static task
static1
Behavioral task
behavioral1
Sample
75fbd9ac1fc1fb395c4f26e845803fbd.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
75fbd9ac1fc1fb395c4f26e845803fbd.exe
Resource
win10v2004-20231215-en
General
-
Target
75fbd9ac1fc1fb395c4f26e845803fbd.exe
-
Size
787KB
-
MD5
75fbd9ac1fc1fb395c4f26e845803fbd
-
SHA1
5f7e04cf10d4eae95b041cde85a0c268502b8436
-
SHA256
c0c9e2acb985a0115c7cc956dc4566e628ada43c257355623d0533ba398d0a19
-
SHA512
7235a66f987b70948f48921a4ab0f33545fd53cb84e4c8361eb2922be7993db142c6a605a57d23170e628745a87e5548e6158ea0dd40495a25db650d1d977199
-
SSDEEP
24576:qKeyxTAJj7P+yW6mc1YN1ChWrKFhTkDvIj6k7DS:qKeyRA0y9fWN1ChWePDj6k/S
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3760 jehrrgmfemqu.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\abhr\jehrrgmfemqu.exe 75fbd9ac1fc1fb395c4f26e845803fbd.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2256 wrote to memory of 3760 2256 75fbd9ac1fc1fb395c4f26e845803fbd.exe 27 PID 2256 wrote to memory of 3760 2256 75fbd9ac1fc1fb395c4f26e845803fbd.exe 27 PID 2256 wrote to memory of 3760 2256 75fbd9ac1fc1fb395c4f26e845803fbd.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\75fbd9ac1fc1fb395c4f26e845803fbd.exe"C:\Users\Admin\AppData\Local\Temp\75fbd9ac1fc1fb395c4f26e845803fbd.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Program Files (x86)\abhr\jehrrgmfemqu.exe"C:\Program Files (x86)\abhr\jehrrgmfemqu.exe"2⤵
- Executes dropped EXE
PID:3760
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216KB
MD523ea30c6c60e8473e50df584d09aad1d
SHA1d985cd40e96f9ac1a230c992726109bec5892439
SHA256794745f22c67ddde9d01c0aaac8d058c3a46dd3d38cb8765e31110a53c0331d0
SHA51234cf58d5dbd0fab0b1035fdfeafa0b66e278a6cb911785fbbe058dbc57f2f96a15e0ae00538d31fc5ba89165451d011efcb6e7446cd6bb74b2469ed6d537f721
-
Filesize
110KB
MD5e76dcf0e699f02566d2381c40bef0111
SHA159e87e894998cf273fd32688f88a23db0db311bb
SHA256f4ee5aeab543c1fdc239958ca775ee875e4e9ebe9355adbf598f745ccf6ec920
SHA5124c864a33a2df428445f9a2f56fb3e4b8a0eccecb059321c8d1ffe452b5df56294de99f5a512e2b35431fea1b9c3fc622d6a277b4a6c817275f5d06a2c39c2d01