Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
18/01/2024, 21:33
Static task
static1
Behavioral task
behavioral1
Sample
b716baea0866421f013912e77e5db815.exe
Resource
win7-20231129-en
3 signatures
150 seconds
General
-
Target
b716baea0866421f013912e77e5db815.exe
-
Size
1.5MB
-
MD5
b716baea0866421f013912e77e5db815
-
SHA1
bb1f3c97e58729b476f19d4c70a825eeaacdb9cd
-
SHA256
ff6d1e2e67efbf5eae5a6814c8655423e67f48fc8c2375d158e0c1f8e3e9e144
-
SHA512
29fbf96d747405fe72035fe50e308f3238ba2576d1cf24a51b09c67b1081c33dfe2ece6e78f5232b69150b132be17b27b79066be64d7b6365d7db7ffec96a11b
-
SSDEEP
24576:Zj9bjkIP9yCNPPZW1XCzQ4J0vbl9bK/0NfmafPpLrloEJzU1WwlIiYTJiOV2Exwu:1ZBZrq1DusNfxPpJJzUceRYTXgEuu
Malware Config
Extracted
Family
risepro
C2
193.233.132.62:50500
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2496 set thread context of 5012 2496 b716baea0866421f013912e77e5db815.exe 40 -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2496 wrote to memory of 5012 2496 b716baea0866421f013912e77e5db815.exe 40 PID 2496 wrote to memory of 5012 2496 b716baea0866421f013912e77e5db815.exe 40 PID 2496 wrote to memory of 5012 2496 b716baea0866421f013912e77e5db815.exe 40 PID 2496 wrote to memory of 5012 2496 b716baea0866421f013912e77e5db815.exe 40 PID 2496 wrote to memory of 5012 2496 b716baea0866421f013912e77e5db815.exe 40 PID 2496 wrote to memory of 5012 2496 b716baea0866421f013912e77e5db815.exe 40 PID 2496 wrote to memory of 5012 2496 b716baea0866421f013912e77e5db815.exe 40 PID 2496 wrote to memory of 5012 2496 b716baea0866421f013912e77e5db815.exe 40 PID 2496 wrote to memory of 5012 2496 b716baea0866421f013912e77e5db815.exe 40 PID 2496 wrote to memory of 5012 2496 b716baea0866421f013912e77e5db815.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\b716baea0866421f013912e77e5db815.exe"C:\Users\Admin\AppData\Local\Temp\b716baea0866421f013912e77e5db815.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:5012
-