Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
165s -
max time network
179s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
06/01/2024, 05:26
Static task
static1
Behavioral task
behavioral1
Sample
4566420e0500471cea5bfcb37cf4cfdd.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4566420e0500471cea5bfcb37cf4cfdd.exe
Resource
win10v2004-20231215-en
General
-
Target
4566420e0500471cea5bfcb37cf4cfdd.exe
-
Size
10.7MB
-
MD5
4566420e0500471cea5bfcb37cf4cfdd
-
SHA1
310d569c575be88386a34ef1bcdc0472a3670ed6
-
SHA256
263b008e6d03d9247bbb9c40e29105054b98132788a2461a56cc44b8beb48ac6
-
SHA512
9adeafa898d72d90011c381a66f405c498684c23e1af3ae3672b0b8d0014092348f518584a36398bc59f918d5622f3954cfb8bce1e6c367a49ea07621613cd34
-
SSDEEP
196608:vYcxyOcAC1Llzsekjwma8V4NHf93Szpjc241Q7sPkjtVadhOIPY3o7RDmReJn+Tf:Rxyyyhs7a8V8Noc24KdadIW6MulVFKGt
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4360 4566420e0500471cea5bfcb37cf4cfdd.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4704 wrote to memory of 4360 4704 4566420e0500471cea5bfcb37cf4cfdd.exe 93 PID 4704 wrote to memory of 4360 4704 4566420e0500471cea5bfcb37cf4cfdd.exe 93 PID 4704 wrote to memory of 4360 4704 4566420e0500471cea5bfcb37cf4cfdd.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\4566420e0500471cea5bfcb37cf4cfdd.exe"C:\Users\Admin\AppData\Local\Temp\4566420e0500471cea5bfcb37cf4cfdd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Users\Admin\AppData\Local\Temp\is-DQK6P.tmp\4566420e0500471cea5bfcb37cf4cfdd.tmp"C:\Users\Admin\AppData\Local\Temp\is-DQK6P.tmp\4566420e0500471cea5bfcb37cf4cfdd.tmp" /SL5="$130032,10891445,52736,C:\Users\Admin\AppData\Local\Temp\4566420e0500471cea5bfcb37cf4cfdd.exe"2⤵
- Executes dropped EXE
PID:4360
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
686KB
MD5e72a086eb6ae90ebcf93d057a39eed6a
SHA18d3808d0f5b3953d377c47200e719cbc49c08ab0
SHA256c0fcf5409d5f937962b33c027b004402b1c79a9e899fa0d30371e13767cd9eb5
SHA5128f3f8c8ea866b6e6348e588ed9aae1b80d685aed421a47077c8f6df65f2427fb860b394e49b3fbea228c9a806a074fd94cb5b69bc3d33cc0579def08bcbf66f0