Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
9s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
28/12/2023, 20:37
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
f67c7a6d67c9fb6ae66f998cecfd6425.exe
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
f67c7a6d67c9fb6ae66f998cecfd6425.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
f67c7a6d67c9fb6ae66f998cecfd6425.exe
-
Size
116KB
-
MD5
f67c7a6d67c9fb6ae66f998cecfd6425
-
SHA1
99de80d50577cff015b26c5cc4719f5ff5483b4e
-
SHA256
8173514af97106b73aa2ea91f33d00bf34d3c8260b0ffe04785ab548a816d4fa
-
SHA512
44efcb344763fe5e87b0625d83d78d0d593c2efe772029128434cbe6d9e506876b114822802b714fd2f310981b3ea705c1b4e6f299365cacfabe70ccc3587249
-
SSDEEP
3072:Uaa0D1KkotKspI7Kc1nQIn8wBeKYVJlB1:EU0TIhP8bnVJ/1
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4476 msa.exe -
resource yara_rule behavioral2/memory/4476-10-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral2/memory/4476-707-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral2/memory/5076-18376-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral2/memory/5076-43933-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral2/memory/5076-43935-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral2/memory/5076-43936-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral2/memory/5076-43939-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral2/memory/5076-43941-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral2/memory/5076-43944-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral2/memory/5076-43945-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral2/memory/5076-43948-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral2/memory/5076-43949-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral2/memory/5076-43951-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral2/memory/5076-43954-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral2/memory/5076-43955-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral2/memory/5076-43957-0x0000000000400000-0x0000000000435000-memory.dmp upx -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\Tasks\{5B57CF47-0BFA-43c6-ACF9-3B3653DCADBA}.job f67c7a6d67c9fb6ae66f998cecfd6425.exe File opened for modification C:\Windows\Tasks\{5B57CF47-0BFA-43c6-ACF9-3B3653DCADBA}.job f67c7a6d67c9fb6ae66f998cecfd6425.exe File created C:\Windows\msa.exe f67c7a6d67c9fb6ae66f998cecfd6425.exe File opened for modification C:\Windows\msa.exe f67c7a6d67c9fb6ae66f998cecfd6425.exe File created C:\Windows\Tasks\{5B57CF47-0BFA-43c6-ACF9-3B3653DCADBA}.job msa.exe File opened for modification C:\Windows\Tasks\{5B57CF47-0BFA-43c6-ACF9-3B3653DCADBA}.job msa.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5076 wrote to memory of 4476 5076 f67c7a6d67c9fb6ae66f998cecfd6425.exe 59 PID 5076 wrote to memory of 4476 5076 f67c7a6d67c9fb6ae66f998cecfd6425.exe 59 PID 5076 wrote to memory of 4476 5076 f67c7a6d67c9fb6ae66f998cecfd6425.exe 59
Processes
-
C:\Users\Admin\AppData\Local\Temp\f67c7a6d67c9fb6ae66f998cecfd6425.exe"C:\Users\Admin\AppData\Local\Temp\f67c7a6d67c9fb6ae66f998cecfd6425.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Windows\msa.exeC:\Windows\msa.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4476
-