Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
08/01/2024, 07:56
Static task
static1
Behavioral task
behavioral1
Sample
4adec794078fffadccea9cb240bb50cb.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4adec794078fffadccea9cb240bb50cb.exe
Resource
win10v2004-20231215-en
General
-
Target
4adec794078fffadccea9cb240bb50cb.exe
-
Size
224KB
-
MD5
4adec794078fffadccea9cb240bb50cb
-
SHA1
6ca940aab44e1e4f5afa118e0b1af55059f4cf72
-
SHA256
96e26b6d3e066f014789a584c1a9633ef4751f97dfb924679a0b6ed1c2682a5f
-
SHA512
24c1e7b6ed912fd814bb48edf763c38e19804309ff680f1d106d083c083f13fb6faef7d0017f1b4c808f2f73fbbf85125ba051edf6a8946dd84b84bfc0d50cec
-
SSDEEP
6144:QceszP4/T04LsE6370CjUdapCTI2IOGdpDpB4ST:QcvL4RLpN6UdapCTI2IO6X4ST
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3040 0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3040 0.exe 3040 0.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 436 wrote to memory of 404 436 4adec794078fffadccea9cb240bb50cb.exe 32 PID 436 wrote to memory of 404 436 4adec794078fffadccea9cb240bb50cb.exe 32 PID 436 wrote to memory of 1036 436 4adec794078fffadccea9cb240bb50cb.exe 29 PID 436 wrote to memory of 1036 436 4adec794078fffadccea9cb240bb50cb.exe 29 PID 404 wrote to memory of 3040 404 CMD.exe 27 PID 404 wrote to memory of 3040 404 CMD.exe 27 PID 404 wrote to memory of 3040 404 CMD.exe 27 PID 3040 wrote to memory of 3392 3040 0.exe 52 PID 3040 wrote to memory of 3392 3040 0.exe 52 PID 3040 wrote to memory of 3392 3040 0.exe 52 PID 3040 wrote to memory of 3392 3040 0.exe 52 PID 3040 wrote to memory of 3392 3040 0.exe 52 PID 3040 wrote to memory of 3392 3040 0.exe 52
Processes
-
C:\Users\Admin\AppData\Local\Temp\4adec794078fffadccea9cb240bb50cb.exe"C:\Users\Admin\AppData\Local\Temp\4adec794078fffadccea9cb240bb50cb.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Windows\SYSTEM32\CMD.exeCMD.exe /k start %TEMP%\1.jpg2⤵PID:1036
-
-
C:\Windows\SYSTEM32\CMD.exeCMD.exe /k start %TEMP%\0.exe2⤵
- Suspicious use of WriteProcessMemory
PID:404
-
-
C:\Users\Admin\AppData\Local\Temp\0.exeC:\Users\Admin\AppData\Local\Temp\0.exe1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3040
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3392