Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 05:12
Static task
static1
Behavioral task
behavioral1
Sample
0717a1e0830d6cf2dfc43dde026f4dbc.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0717a1e0830d6cf2dfc43dde026f4dbc.exe
Resource
win10v2004-20231215-en
General
-
Target
0717a1e0830d6cf2dfc43dde026f4dbc.exe
-
Size
1.5MB
-
MD5
0717a1e0830d6cf2dfc43dde026f4dbc
-
SHA1
1c54da793cc454a363756a5f4ef9c82dfdeddb27
-
SHA256
dbabf0ad9f6b527b362ddcc01abb3b59ea799c2d33ce0db03c28d083178b7636
-
SHA512
0f7188019345075edc6ca87d915960b04c5a4fe4230a746b5861ce885c19b3d52c026bb9f0ef3d4e3dc9ce6b2d619ba641f448384d7259579e262171db97eae7
-
SSDEEP
24576:k20ojqb/MXJb0f06cUQnbPL8RjpJAAok0lAqnaARFE7SghZ+3MumS/Dt:k235b0NTQnX8RdJAAoknqrzSSgL+3nm0
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4848 0717a1e0830d6cf2dfc43dde026f4dbc.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2480 wrote to memory of 4848 2480 0717a1e0830d6cf2dfc43dde026f4dbc.exe 19 PID 2480 wrote to memory of 4848 2480 0717a1e0830d6cf2dfc43dde026f4dbc.exe 19 PID 2480 wrote to memory of 4848 2480 0717a1e0830d6cf2dfc43dde026f4dbc.exe 19
Processes
-
C:\Users\Admin\AppData\Local\Temp\0717a1e0830d6cf2dfc43dde026f4dbc.exe"C:\Users\Admin\AppData\Local\Temp\0717a1e0830d6cf2dfc43dde026f4dbc.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Users\Admin\AppData\Local\Temp\is-4NNF1.tmp\0717a1e0830d6cf2dfc43dde026f4dbc.tmp"C:\Users\Admin\AppData\Local\Temp\is-4NNF1.tmp\0717a1e0830d6cf2dfc43dde026f4dbc.tmp" /SL5="$70040,1292609,64512,C:\Users\Admin\AppData\Local\Temp\0717a1e0830d6cf2dfc43dde026f4dbc.exe"2⤵
- Executes dropped EXE
PID:4848
-