Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2023, 18:25
Static task
static1
Behavioral task
behavioral1
Sample
00635c23c53d70b01d08c709bf2281fe.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
00635c23c53d70b01d08c709bf2281fe.exe
Resource
win10v2004-20231215-en
General
-
Target
00635c23c53d70b01d08c709bf2281fe.exe
-
Size
1.9MB
-
MD5
00635c23c53d70b01d08c709bf2281fe
-
SHA1
fd6f4aa5839045b4ccd1384f472257a16b5c1cd5
-
SHA256
0ad276e88c7f459cee2e414dcf1af08cb7735ac0e584c9db03f36cef774a0558
-
SHA512
67e44296d4741cd1491d712fcedec8ae7ff28b6b048523b374f46d9a44536a96f85864a7bb3c8da4ac50af9ec79060666620aa05000c8fb0593eaeb372d4a582
-
SSDEEP
24576:N2oo60HPdt+1CRiY2eOBvcj3u10doiqP89AFe1KXzKW9Yp7IL0ogkuqX8le9fdrx:Qoa1taC070diRzKBWRuqgctInSlrOpE
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2980 5266.tmp -
Executes dropped EXE 1 IoCs
pid Process 2980 5266.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4792 wrote to memory of 2980 4792 00635c23c53d70b01d08c709bf2281fe.exe 92 PID 4792 wrote to memory of 2980 4792 00635c23c53d70b01d08c709bf2281fe.exe 92 PID 4792 wrote to memory of 2980 4792 00635c23c53d70b01d08c709bf2281fe.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\00635c23c53d70b01d08c709bf2281fe.exe"C:\Users\Admin\AppData\Local\Temp\00635c23c53d70b01d08c709bf2281fe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Users\Admin\AppData\Local\Temp\5266.tmp"C:\Users\Admin\AppData\Local\Temp\5266.tmp" --splashC:\Users\Admin\AppData\Local\Temp\00635c23c53d70b01d08c709bf2281fe.exe 62F923799157C649199D26386C53B06F7A5E0A5DF92C2B5E378A500C0F8AC5025310B65956C8C175231C4CA35D02DA2F5666F1F1835E8FE9DEDB812CFBA9BE4A2⤵
- Deletes itself
- Executes dropped EXE
PID:2980
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD57bd15db44f8de2d2e1377bad24ae6a1f
SHA1144c9c300187cf111d851814fc5db540adbe9d7a
SHA256f10bd849b9f114c29dad6229364cc5ff5a7dde22932b2809e8db0bdf924c86d9
SHA512d51dc06693b8b0c29012e8e38a7a25705aec7078b0da92541c50c3bf8c0c9f3a2e761650119959fbeb031ec83dc7ef78508ac998ab9203faafc3bae3d037cdec