Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
161s -
max time network
192s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 02:32
Static task
static1
Behavioral task
behavioral1
Sample
0bc78b9c8763e7eae16eebe378212a6a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0bc78b9c8763e7eae16eebe378212a6a.exe
Resource
win10v2004-20231215-en
General
-
Target
0bc78b9c8763e7eae16eebe378212a6a.exe
-
Size
505KB
-
MD5
0bc78b9c8763e7eae16eebe378212a6a
-
SHA1
f8f32f85cb191176bcb501f7918771c0ef5c46db
-
SHA256
231d93eab5a0b79daeca051ed3cfe3603af93bafeb934e6b366e6cce41ed1c9f
-
SHA512
0e3a6c70efe29df1eed0b1e9de3a31d06ded509da538b498b9824628663a1a52439ebd4ee09c4d3319cf9314f08a5c190c743ec2e3483be4de1dd58c44c802af
-
SSDEEP
12288:CSxG05888888888888W88888888888/4khP50GG7/uuzggp6NMWfpRoNtqJPBg:pxGY70G6BzzwNMWPP+
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3372 0bc78b9c8763e7eae16eebe378212a6a.tmp -
Loads dropped DLL 1 IoCs
pid Process 3372 0bc78b9c8763e7eae16eebe378212a6a.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3344 wrote to memory of 3372 3344 0bc78b9c8763e7eae16eebe378212a6a.exe 89 PID 3344 wrote to memory of 3372 3344 0bc78b9c8763e7eae16eebe378212a6a.exe 89 PID 3344 wrote to memory of 3372 3344 0bc78b9c8763e7eae16eebe378212a6a.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\0bc78b9c8763e7eae16eebe378212a6a.exe"C:\Users\Admin\AppData\Local\Temp\0bc78b9c8763e7eae16eebe378212a6a.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Users\Admin\AppData\Local\Temp\is-CV59J.tmp\0bc78b9c8763e7eae16eebe378212a6a.tmp"C:\Users\Admin\AppData\Local\Temp\is-CV59J.tmp\0bc78b9c8763e7eae16eebe378212a6a.tmp" /SL5="$140052,127487,119296,C:\Users\Admin\AppData\Local\Temp\0bc78b9c8763e7eae16eebe378212a6a.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3372
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD54de6f44810bad050ac81f45549d58f34
SHA1e001b982a0a978deed96789f943bf295dd2ba1d8
SHA256cf8a77f4cbd38f6ab44fcff738f81ec8dfdaa7ef5a64d62fdd84c6fe897adff5
SHA512550e468c3d6660ce2030fca16549eace9153610e19621cba83fea691f8d0091edb596a869168cf4b7f80fa55a808ca1703e4e2beffb3ade5af3fb67b6ead6673
-
Filesize
15KB
MD52ea92b11633afadba96648666b9df024
SHA125cae5012a8fe86c34e5918613be3fc4e7480fbd
SHA256ad04e5eeec0ed157c4c6c5a1b919746e04d6270a15d8d6fb192bbc566d2fd3d7
SHA512dd85de944271aa333d9eac175bd2167c5cb8771ece679af888a96e340dd5f1728ad3e3f9209546f5e17f22e91a9659e7168e12a7935ab4820e135a9f1f534471