Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
14/01/2024, 05:15
Behavioral task
behavioral1
Sample
5a60620d5f589f78a95a576e45afce3e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5a60620d5f589f78a95a576e45afce3e.exe
Resource
win10v2004-20231222-en
General
-
Target
5a60620d5f589f78a95a576e45afce3e.exe
-
Size
110KB
-
MD5
5a60620d5f589f78a95a576e45afce3e
-
SHA1
e32dcf4a7ede8947c134604cd0c863f77f5f4d6f
-
SHA256
ac090deb152f4a444639866dcc31f20bb00c725f29ef4c96b9b210fe576ead26
-
SHA512
4d78f77260194b51aecfc3a8a4ed50481508aae72af58c4bc7a1a6faf2e0e67fbae6e712454c74e60d3e7ca8df9041e5449dbc4515f8135df0805300edab30fb
-
SSDEEP
1536:aayvRUVU37ciNbyChBkqHzk+lY1zGdRAbor10wUSfj41Y1UIQDeJhlWeEithf0Lu:reCe7BzPMw12YjzQCh81i3f0LOJ7Bn
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3980 apocalyps32.exe -
resource yara_rule behavioral2/memory/2864-0-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2864-5-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3980-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3980-7-0x0000000040010000-0x000000004004C000-memory.dmp upx behavioral2/files/0x000600000001e630-4.dat upx behavioral2/files/0x000600000001e630-3.dat upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\apocalyps32.exe 5a60620d5f589f78a95a576e45afce3e.exe File opened for modification C:\Windows\apocalyps32.exe 5a60620d5f589f78a95a576e45afce3e.exe File created C:\Windows\apocalyps32.exe apocalyps32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2864 wrote to memory of 3980 2864 5a60620d5f589f78a95a576e45afce3e.exe 21 PID 2864 wrote to memory of 3980 2864 5a60620d5f589f78a95a576e45afce3e.exe 21 PID 2864 wrote to memory of 3980 2864 5a60620d5f589f78a95a576e45afce3e.exe 21 PID 3980 wrote to memory of 3620 3980 apocalyps32.exe 18 PID 3980 wrote to memory of 3620 3980 apocalyps32.exe 18 PID 3980 wrote to memory of 3620 3980 apocalyps32.exe 18 PID 3980 wrote to memory of 3620 3980 apocalyps32.exe 18 PID 3980 wrote to memory of 3620 3980 apocalyps32.exe 18 PID 3980 wrote to memory of 3620 3980 apocalyps32.exe 18 PID 3980 wrote to memory of 3620 3980 apocalyps32.exe 18 PID 3980 wrote to memory of 3620 3980 apocalyps32.exe 18 PID 3980 wrote to memory of 3620 3980 apocalyps32.exe 18 PID 3980 wrote to memory of 3620 3980 apocalyps32.exe 18 PID 3980 wrote to memory of 3620 3980 apocalyps32.exe 18 PID 3980 wrote to memory of 3620 3980 apocalyps32.exe 18 PID 3980 wrote to memory of 3620 3980 apocalyps32.exe 18 PID 3980 wrote to memory of 3620 3980 apocalyps32.exe 18 PID 3980 wrote to memory of 3620 3980 apocalyps32.exe 18 PID 3980 wrote to memory of 3620 3980 apocalyps32.exe 18 PID 3980 wrote to memory of 3620 3980 apocalyps32.exe 18 PID 3980 wrote to memory of 3620 3980 apocalyps32.exe 18 PID 3980 wrote to memory of 3620 3980 apocalyps32.exe 18 PID 3980 wrote to memory of 3620 3980 apocalyps32.exe 18 PID 3980 wrote to memory of 3620 3980 apocalyps32.exe 18 PID 3980 wrote to memory of 3620 3980 apocalyps32.exe 18 PID 3980 wrote to memory of 3620 3980 apocalyps32.exe 18 PID 3980 wrote to memory of 3620 3980 apocalyps32.exe 18 PID 3980 wrote to memory of 3620 3980 apocalyps32.exe 18 PID 3980 wrote to memory of 3620 3980 apocalyps32.exe 18 PID 3980 wrote to memory of 3620 3980 apocalyps32.exe 18 PID 3980 wrote to memory of 3620 3980 apocalyps32.exe 18 PID 3980 wrote to memory of 3620 3980 apocalyps32.exe 18 PID 3980 wrote to memory of 3620 3980 apocalyps32.exe 18 PID 3980 wrote to memory of 3620 3980 apocalyps32.exe 18 PID 3980 wrote to memory of 3620 3980 apocalyps32.exe 18 PID 3980 wrote to memory of 3620 3980 apocalyps32.exe 18 PID 3980 wrote to memory of 3620 3980 apocalyps32.exe 18 PID 3980 wrote to memory of 3620 3980 apocalyps32.exe 18 PID 3980 wrote to memory of 3620 3980 apocalyps32.exe 18 PID 3980 wrote to memory of 3620 3980 apocalyps32.exe 18 PID 3980 wrote to memory of 3620 3980 apocalyps32.exe 18 PID 3980 wrote to memory of 3620 3980 apocalyps32.exe 18 PID 3980 wrote to memory of 3620 3980 apocalyps32.exe 18 PID 3980 wrote to memory of 3620 3980 apocalyps32.exe 18 PID 3980 wrote to memory of 3620 3980 apocalyps32.exe 18 PID 3980 wrote to memory of 3620 3980 apocalyps32.exe 18 PID 3980 wrote to memory of 3620 3980 apocalyps32.exe 18 PID 3980 wrote to memory of 3620 3980 apocalyps32.exe 18 PID 3980 wrote to memory of 3620 3980 apocalyps32.exe 18 PID 3980 wrote to memory of 3620 3980 apocalyps32.exe 18 PID 3980 wrote to memory of 3620 3980 apocalyps32.exe 18 PID 3980 wrote to memory of 3620 3980 apocalyps32.exe 18 PID 3980 wrote to memory of 3620 3980 apocalyps32.exe 18 PID 3980 wrote to memory of 3620 3980 apocalyps32.exe 18 PID 3980 wrote to memory of 3620 3980 apocalyps32.exe 18 PID 3980 wrote to memory of 3620 3980 apocalyps32.exe 18 PID 3980 wrote to memory of 3620 3980 apocalyps32.exe 18 PID 3980 wrote to memory of 3620 3980 apocalyps32.exe 18 PID 3980 wrote to memory of 3620 3980 apocalyps32.exe 18 PID 3980 wrote to memory of 3620 3980 apocalyps32.exe 18 PID 3980 wrote to memory of 3620 3980 apocalyps32.exe 18 PID 3980 wrote to memory of 3620 3980 apocalyps32.exe 18 PID 3980 wrote to memory of 3620 3980 apocalyps32.exe 18 PID 3980 wrote to memory of 3620 3980 apocalyps32.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a60620d5f589f78a95a576e45afce3e.exe"C:\Users\Admin\AppData\Local\Temp\5a60620d5f589f78a95a576e45afce3e.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\apocalyps32.exe-bs2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"1⤵PID:3620
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
57KB
MD5a45a0ed02df9657600605f01cbddc2e3
SHA16e8aedcb32019b191515ba349cc7639380bf0ea3
SHA2563a3ade4efb65591f93cc1d974a6849a6cbc8612f3ff1c46740b8d3a1f348b521
SHA512a5e5f47d452500e95aa714f84861f8bd6e328df67f3a24888b9066974dacb72b57014ed43ee015a4ef790f41a83e32fa4d09fe9837df2031dbbca444dc476f95
-
Filesize
63KB
MD59eab257946d2f1938afb3a7028c87319
SHA185de8aa8eea4df0d35776890d41c6a7aae98767f
SHA2564f777cd5f38e2745b2c978aa9c7d548d877bcc51035ff22b129ae915744b593a
SHA5122ba4b90ac7038c96770df8f93657efd3757e8d1dae0852484900035a7b4cfe0cd220e6496fe745b634e68a3aab67d5c51b218abdb69e07208f3f101ccaffa7fa