Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
168s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04/01/2024, 14:31
Static task
static1
Behavioral task
behavioral1
Sample
411c0dac755c75716225dc491f202da0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
411c0dac755c75716225dc491f202da0.exe
Resource
win10v2004-20231215-en
General
-
Target
411c0dac755c75716225dc491f202da0.exe
-
Size
841KB
-
MD5
411c0dac755c75716225dc491f202da0
-
SHA1
7c315b9956a7830b1309afc7aa546851757ceb59
-
SHA256
feb58133510297f098e0da758df1e76b43166a12be82e6fc033b227de739d315
-
SHA512
6031e562f31a058ca8fc33a0288a796b93d1cf590a92cd121b8edb859ecc330ab131b62c76f1665b5b3f15c39693a8644d496d6c76d8c30aab1e2819858ba033
-
SSDEEP
24576:goKPe7+9c1zVF6EvkCS05iQksiQrGR0ST:goKPENBVMEv9D5zxrGRb
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2852 INS14BC.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3480 wrote to memory of 2852 3480 411c0dac755c75716225dc491f202da0.exe 44 PID 3480 wrote to memory of 2852 3480 411c0dac755c75716225dc491f202da0.exe 44 PID 3480 wrote to memory of 2852 3480 411c0dac755c75716225dc491f202da0.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\411c0dac755c75716225dc491f202da0.exe"C:\Users\Admin\AppData\Local\Temp\411c0dac755c75716225dc491f202da0.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Users\Admin\AppData\Local\Temp\INS14BC.tmpC:\Users\Admin\AppData\Local\Temp\INS14BC.tmp /SL3 $601D6 C:\Users\Admin\AppData\Local\Temp\411c0dac755c75716225dc491f202da0.exe 846233 849576 614402⤵
- Executes dropped EXE
PID:2852
-