Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
62s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 12:09
Static task
static1
Behavioral task
behavioral1
Sample
1d22072a96ed4015ba12ff9add930db3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1d22072a96ed4015ba12ff9add930db3.exe
Resource
win10v2004-20231215-en
General
-
Target
1d22072a96ed4015ba12ff9add930db3.exe
-
Size
337KB
-
MD5
1d22072a96ed4015ba12ff9add930db3
-
SHA1
32f209d696c876ab0b94a4b8e6d2197ab4fd7af8
-
SHA256
d00f2d9c5d36edd77398c50ee4d9614e4776957cf0b2c795030ace01435bd707
-
SHA512
571363b6a5ae77073df7ac36530d62fbfcad45be57f6c43b32d81b6ca6a4a111064a55ec443f12e3bd45116a6757aad7e3f6ca1dcf8b021fc0012404a631ff31
-
SSDEEP
6144:rxrq2m47akuF7wLjYkZ/hGTcIoOJmNF5ujYaWdf:l+2TukuF7wLj3ZJ4cIoOJg3ujXWdf
Malware Config
Signatures
-
Executes dropped EXE 5 IoCs
pid Process 4288 windmedias.exe 3560 windmedias.exe 4584 windmedias.exe 4628 windmedias.exe 1216 windmedias.exe -
Drops file in System32 directory 10 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\windmedias.exe 1d22072a96ed4015ba12ff9add930db3.exe File opened for modification C:\Windows\SysWOW64\windmedias.exe windmedias.exe File created C:\Windows\SysWOW64\windmedias.exe windmedias.exe File created C:\Windows\SysWOW64\windmedias.exe windmedias.exe File opened for modification C:\Windows\SysWOW64\windmedias.exe windmedias.exe File created C:\Windows\SysWOW64\windmedias.exe 1d22072a96ed4015ba12ff9add930db3.exe File created C:\Windows\SysWOW64\windmedias.exe windmedias.exe File opened for modification C:\Windows\SysWOW64\windmedias.exe windmedias.exe File created C:\Windows\SysWOW64\windmedias.exe windmedias.exe File opened for modification C:\Windows\SysWOW64\windmedias.exe windmedias.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2236 wrote to memory of 4288 2236 1d22072a96ed4015ba12ff9add930db3.exe 64 PID 2236 wrote to memory of 4288 2236 1d22072a96ed4015ba12ff9add930db3.exe 64 PID 2236 wrote to memory of 4288 2236 1d22072a96ed4015ba12ff9add930db3.exe 64 PID 4288 wrote to memory of 3560 4288 windmedias.exe 99 PID 4288 wrote to memory of 3560 4288 windmedias.exe 99 PID 4288 wrote to memory of 3560 4288 windmedias.exe 99 PID 3560 wrote to memory of 4584 3560 windmedias.exe 101 PID 3560 wrote to memory of 4584 3560 windmedias.exe 101 PID 3560 wrote to memory of 4584 3560 windmedias.exe 101 PID 4584 wrote to memory of 4628 4584 windmedias.exe 103 PID 4584 wrote to memory of 4628 4584 windmedias.exe 103 PID 4584 wrote to memory of 4628 4584 windmedias.exe 103 PID 4628 wrote to memory of 1216 4628 windmedias.exe 106 PID 4628 wrote to memory of 1216 4628 windmedias.exe 106 PID 4628 wrote to memory of 1216 4628 windmedias.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d22072a96ed4015ba12ff9add930db3.exe"C:\Users\Admin\AppData\Local\Temp\1d22072a96ed4015ba12ff9add930db3.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\SysWOW64\windmedias.exeC:\Windows\system32\windmedias.exe 1140 "C:\Users\Admin\AppData\Local\Temp\1d22072a96ed4015ba12ff9add930db3.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Windows\SysWOW64\windmedias.exeC:\Windows\system32\windmedias.exe 1144 "C:\Windows\SysWOW64\windmedias.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3560 -
C:\Windows\SysWOW64\windmedias.exeC:\Windows\system32\windmedias.exe 1112 "C:\Windows\SysWOW64\windmedias.exe"4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Windows\SysWOW64\windmedias.exeC:\Windows\system32\windmedias.exe 1116 "C:\Windows\SysWOW64\windmedias.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Windows\SysWOW64\windmedias.exeC:\Windows\system32\windmedias.exe 1104 "C:\Windows\SysWOW64\windmedias.exe"6⤵
- Executes dropped EXE
PID:1216 -
C:\Windows\SysWOW64\windmedias.exeC:\Windows\system32\windmedias.exe 1124 "C:\Windows\SysWOW64\windmedias.exe"7⤵PID:4072
-
C:\Windows\SysWOW64\windmedias.exeC:\Windows\system32\windmedias.exe 1092 "C:\Windows\SysWOW64\windmedias.exe"8⤵PID:2140
-
C:\Windows\SysWOW64\windmedias.exeC:\Windows\system32\windmedias.exe 1136 "C:\Windows\SysWOW64\windmedias.exe"9⤵PID:2200
-
C:\Windows\SysWOW64\windmedias.exeC:\Windows\system32\windmedias.exe 1148 "C:\Windows\SysWOW64\windmedias.exe"10⤵PID:2240
-
C:\Windows\SysWOW64\windmedias.exeC:\Windows\system32\windmedias.exe 1152 "C:\Windows\SysWOW64\windmedias.exe"11⤵PID:1844
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
69KB
MD5973eb487c35ec4d27b28968d6e6a9e1a
SHA1fdfe239a56ab6225b568858f0f74eee06ada6cb2
SHA25699168d81eb721f779795e11c370d60d9f61eec3cf8bd8aedd0058fdca1fa251b
SHA5129f94ccb4ba4d8d228a03a670e960078e1ea64840fcf485117d83cb614d13e7f3f8a2b4ea8ec452ae556a85c429c447a2f8802b3d0ab7b330807bd027eeb80e76
-
Filesize
20KB
MD517761be147cd7cbabd3f03b9f1d0e88b
SHA16befc89283927b8e81c082041db9ae30450a0269
SHA2564ae5f32d14e8d109986fb60f1aa1d9f0ec81fd9f27f646aa9bd45939b5103772
SHA5122bacfb6870063481cd8031a00907ce4097104ffb998cafb9bcf2322fc11a97a19aab83c75ce6fbf7df241dd21e5fff142439fb6adc2f92bb9f0b0e546f5e4f30
-
Filesize
130KB
MD53d70acfcb869f046133da819116f66d9
SHA189b562c231e88546a3eb6d8e3071e1ea00a93763
SHA2561c636fae5cc40d5a379d0ac42a760819af6c1b52121df950b8a29e34b8b6e4ce
SHA51254fd16c693efee721379b2839b239791c0d0cd8c849a75e8aa09463aa6dcb8c6984f38037d5d2fe0ee776411ba09929f0858ec025506a4d49240e85087d1fc0e
-
Filesize
20KB
MD55b8910fa2eeeeb710fb02e591cbff052
SHA154b64e6a9c8ead8c3fab2ce1eaa707d7d0d7b650
SHA256059f121fca23ddd16294e5c28c229384cb651b5ce01e1e57b7a8a3a94c99b35f
SHA5125f32b901f0aa78e5801f60e0ee991d8c32c01f0ac4b48059b868eac75f47ed8d6bc49073d6896db54472be11a873accda6417cb179ae0c01f7cee9bfffc55d05
-
Filesize
337KB
MD51d22072a96ed4015ba12ff9add930db3
SHA132f209d696c876ab0b94a4b8e6d2197ab4fd7af8
SHA256d00f2d9c5d36edd77398c50ee4d9614e4776957cf0b2c795030ace01435bd707
SHA512571363b6a5ae77073df7ac36530d62fbfcad45be57f6c43b32d81b6ca6a4a111064a55ec443f12e3bd45116a6757aad7e3f6ca1dcf8b021fc0012404a631ff31
-
Filesize
169KB
MD5f26b2addc9744f940480e016244bf170
SHA115ed9b982ca4dc5e9640450dc6050465b3dfaff2
SHA256892bd4a71e54018984a83e18ea44eff535730af34e60d0b6d09e31c916c0f273
SHA5123f73cc748759b1155ce388d2493730945dfe722c1a88b6bcf602fae9e65e797be8f8e419e6255862cbe6955facb388b5f4d17b4b98805e69fb39606753a0f954
-
Filesize
78KB
MD51a02ade275cbda92d4cc4ebdc5b19b7d
SHA1828e1866187f77fa0a5e39cef653c200150fb3bb
SHA256faee8425685c55c76779c3107161c205c718d4439b17cc62ddb1de9cd8ff2487
SHA5121f9d56611ae29c725adb414e9aae3d935a333274f8fec0e8b546517ad569c3777ce38fb1894ee5877d685a7b69f4dfc5c3b40f552e061780c41f20dc932c99bb
-
Filesize
53KB
MD531bc984e1b2ab58a35b153b4177d9873
SHA16d4752b4c95cca712ebf6e6bfa37b73d09bc548b
SHA2561a76b10835b864327bf8b31ba9f6f2269625795d5328819483c9eb641a265b2c
SHA512e5b1307ecde197029ec49092f41ed4b1679c74814727008fdde5742ca162d47e51e41f5050c3a6a132adc0de2506919a92fb94bc48ccba10f9f1ddea299de9a1
-
Filesize
37KB
MD51cf55ad2f0c9bd27b99dcecc5d0fb3fd
SHA1f4dbaf57a3145f2011937f204f0c209877188f69
SHA256e024f648c467d540c20dadaf6960d2e3a2acba03e0e5cc5cd71c0da8d7b78f1f
SHA5124355c627095fea48dd0a9dc48fd1babc60d2a77fb5f8625e50e17292a75f5d8aa8f329a1e0fa5dd5298944345e49efa39127e442c6c98e69d28e295828a96aef