Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 12:45
Static task
static1
Behavioral task
behavioral1
Sample
1f790d8a2a51e755fa6055218a14037a.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1f790d8a2a51e755fa6055218a14037a.exe
Resource
win10v2004-20231222-en
General
-
Target
1f790d8a2a51e755fa6055218a14037a.exe
-
Size
1.1MB
-
MD5
1f790d8a2a51e755fa6055218a14037a
-
SHA1
6abfa16fab394b8ec971c55b8f246303051bfbcf
-
SHA256
6b1a2af19b2834df899e74bcb60684585ccb6cfd5ca9d6414e724e2636d1e427
-
SHA512
7e9d31bd9b9dc422eaec445e5a7dafe9cdd0a75a187bed3b5723402a133b2128939acb05c70fda1f42f642ef8f8804b2f3967492b2dfbbc9b366493a80cb9d03
-
SSDEEP
24576:5nar7mgfti3kRqJUNZ0CPLDB4C/41hVa0yd2CQR2OEJaTwKoDsg5j1mu5m:5ajFXZP5LUhVS4DwNQEdQYxU
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 5044 1f790d8a2a51e755fa6055218a14037a.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 456 wrote to memory of 5044 456 1f790d8a2a51e755fa6055218a14037a.exe 20 PID 456 wrote to memory of 5044 456 1f790d8a2a51e755fa6055218a14037a.exe 20 PID 456 wrote to memory of 5044 456 1f790d8a2a51e755fa6055218a14037a.exe 20
Processes
-
C:\Users\Admin\AppData\Local\Temp\1f790d8a2a51e755fa6055218a14037a.exe"C:\Users\Admin\AppData\Local\Temp\1f790d8a2a51e755fa6055218a14037a.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Users\Admin\AppData\Local\Temp\is-PJPM0.tmp\1f790d8a2a51e755fa6055218a14037a.tmp"C:\Users\Admin\AppData\Local\Temp\is-PJPM0.tmp\1f790d8a2a51e755fa6055218a14037a.tmp" /SL5="$F0060,950481,54272,C:\Users\Admin\AppData\Local\Temp\1f790d8a2a51e755fa6055218a14037a.exe"2⤵
- Executes dropped EXE
PID:5044
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
263KB
MD56ee1ed5f47fe1549850ed91119413dc0
SHA1301fcb31976a597d0e48836130a154e5fa60a434
SHA2561e664fe8988255b8ccea072a30857d2065eb58d12c9fbe658147d7db52c88ec3
SHA512a89043fb875f4378e046163c934ae362ba3b74ab883c6a499cbb8d94f15b6413706995cca6826b6095e20971a8457ad8938363e474855404ae1f8ca4b0982eec
-
Filesize
256KB
MD549588285b1b0e5c8b33aa04b01ffb0c7
SHA1e5ea5b25fade9e7a7f78108b1251229a75d3b78f
SHA25657894702f7bcaacc70a95f974aed6f010a4ba3beef596a87127a14bd435df983
SHA512d21bae0a023ab87432f6f8e508c29e867812ff8ef32e7ca2435b1a0790b3c6de775f7900dfb11c345f31aa4f60b0bc8901393705cade449c785dea44d15fbe26