Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    104s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/12/2023, 21:53

General

  • Target

    1dab8aa897b6d76d4d39359c032c9493.exe

  • Size

    40KB

  • MD5

    1dab8aa897b6d76d4d39359c032c9493

  • SHA1

    bd1b02f8727ea38c1c4b250412015b83a2ea80a2

  • SHA256

    e8243293ab1e538d6124d5e3109e6f1795bd91c15a93ae91ae86ea1ff96b4743

  • SHA512

    43cfb911ea626b84fccd615f2028fe3ac8434bccba5e426919438cbdc6a973539cde5df2fac9cba2502d2f2cf32b678ca60472b912a375a6fca97ea520d7b1af

  • SSDEEP

    384:9b3TOmywlnoAUrAxrpFjLhoBOrpFTkKrpFUMNB+GsN7bZDOzDkSTaJ:9bv1noXgrfsOrTZrdB+GsNM

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1dab8aa897b6d76d4d39359c032c9493.exe
    "C:\Users\Admin\AppData\Local\Temp\1dab8aa897b6d76d4d39359c032c9493.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2104
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe"
      2⤵
      • Modifies Internet Explorer settings
      PID:3568
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3568 CREDAT:17410 /prefetch:2
        3⤵
          PID:2644

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads