Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2023, 17:15
Static task
static1
Behavioral task
behavioral1
Sample
fcc4d77dd895ae252ddd6ba1fc4fcb1a.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
fcc4d77dd895ae252ddd6ba1fc4fcb1a.exe
Resource
win10v2004-20231215-en
General
-
Target
fcc4d77dd895ae252ddd6ba1fc4fcb1a.exe
-
Size
1.9MB
-
MD5
fcc4d77dd895ae252ddd6ba1fc4fcb1a
-
SHA1
45816767911cf92d551b64836e6141a3a0b7be76
-
SHA256
81e22c130ade7c83d432a9e5f18cca1eeacbdb9e094a1ca3d772c4db36be6ec4
-
SHA512
cefba65e91a2ecca6dda9b965e4f0840d1cf15d02d9d7268f1d26aee7f030ef1015b5a2d6ed3d55057f123f2f4fc269443dca4eabb5326d020cb560cb15e854a
-
SSDEEP
49152:Qoa1taC070dxVw+8lWdQ9WGfKzxrVxlMG:Qoa1taC0298oaW0Oz
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 772 49AB.tmp -
Executes dropped EXE 1 IoCs
pid Process 772 49AB.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1060 wrote to memory of 772 1060 fcc4d77dd895ae252ddd6ba1fc4fcb1a.exe 68 PID 1060 wrote to memory of 772 1060 fcc4d77dd895ae252ddd6ba1fc4fcb1a.exe 68 PID 1060 wrote to memory of 772 1060 fcc4d77dd895ae252ddd6ba1fc4fcb1a.exe 68
Processes
-
C:\Users\Admin\AppData\Local\Temp\fcc4d77dd895ae252ddd6ba1fc4fcb1a.exe"C:\Users\Admin\AppData\Local\Temp\fcc4d77dd895ae252ddd6ba1fc4fcb1a.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Users\Admin\AppData\Local\Temp\49AB.tmp"C:\Users\Admin\AppData\Local\Temp\49AB.tmp" --splashC:\Users\Admin\AppData\Local\Temp\fcc4d77dd895ae252ddd6ba1fc4fcb1a.exe 4453B07EC65A2F80CDF67BF94B36358130872B5319EAB0A45406C78272D3DAFB76D62F63AE698E64BA28F21C594E7B4BB5A90562CE97400C89EBF3B931EC6E3A2⤵
- Deletes itself
- Executes dropped EXE
PID:772
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
293KB
MD507ebefa52806b6931bd0a6651c521af5
SHA1e1fbf78e346c9e94201ead75ff4b33cda04de61e
SHA25644ab0f8d1c3410507ef42e04faa7325250acd9b8651b0eda2101d4d3b56c9d26
SHA5126f6c18e8c8758e463836397b582b228c56002ad02a9b8c0a109741bfc2df749e07953c63158528e7e3d758a2ea27d5dd1db7fbf4dba822a89a83357d4b29395b
-
Filesize
118KB
MD595afde7bc1ebf6e1012e1c84d03f33aa
SHA1c5add8ed09ab399975f52e4804e13e10ed984b05
SHA256f381da029f21ed6ef74a0ae234cf8142f33109072b49a0ab0f88be9ab548a518
SHA5124e44ca5495dd42c7b0030086a2ee08751a313111c0fcca3f8b1da748e6aa44b7f81540241dc1e8b5940a633315320dc4bc48e96c1352446a96c55f9546a13201