Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    93s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/01/2024, 21:14

General

  • Target

    7e0580bc32a3dc316f087921ea0f18b9.exe

  • Size

    1.9MB

  • MD5

    7e0580bc32a3dc316f087921ea0f18b9

  • SHA1

    b89faac46ed932151b09f97a8d0d1ca0f046856b

  • SHA256

    eb105fe81c8503e52d969072703aa1b6badf5342f13e9e6b08d7cf7605c06a48

  • SHA512

    59e28b03a65cae1037327795cb3bbf5c5401259b22c7b12ab5e1a8f60012af8e30f807798231536a6927fbc7d333f21e002fd25ca108e618d54f46393e711000

  • SSDEEP

    49152:Qoa1taC070dldymcOrKLM6FQLrHZyea5mGSrJu:Qoa1taC0OymcOrKLM6SHQhgGSdu

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7e0580bc32a3dc316f087921ea0f18b9.exe
    "C:\Users\Admin\AppData\Local\Temp\7e0580bc32a3dc316f087921ea0f18b9.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1440
    • C:\Users\Admin\AppData\Local\Temp\4815.tmp
      "C:\Users\Admin\AppData\Local\Temp\4815.tmp" --splashC:\Users\Admin\AppData\Local\Temp\7e0580bc32a3dc316f087921ea0f18b9.exe C5913664C41B0CBFAFB668DF3B248787ED6FEF401B60B7A4AF0190931C871B7318F0ECCC07ED9A8DBBA8CB1B22B776628F6240272116AD5EEEF2C06A4942373F
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:3100

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\4815.tmp

    Filesize

    1.4MB

    MD5

    5b9ec28739ce97a02092fba06e8eef11

    SHA1

    bdd2cc268cdc9622e58220fb613506b69340c23a

    SHA256

    ef77a94a419c497830ea19bac0a296e6b08dd3f59bee2c0993b16e04ba19e3b4

    SHA512

    06c5929788bb77cc1e3f61605515c918ee3855da23aba0f642f640a9dd514568b3e506b70464029167356391cb51e28d768a5801bf3f917d9bf2cc1321d9e67d

  • C:\Users\Admin\AppData\Local\Temp\4815.tmp

    Filesize

    1.4MB

    MD5

    9d400b9aec3edde380985f1f78e77a9f

    SHA1

    69260d4c604dbda9caa7c1c07fd20f6f9e749766

    SHA256

    cb5fdb0fff9cf95f373e80321f5989ae9f885ec818eb725bba00c708d5bbf155

    SHA512

    111f7b92d0a552d84104bcbcedf26280bcfb2c812a17bbb482145189e7db4630c8ee58cfc1893e7213cc9dd6a98c1660b1066bf206839e229cca5eade4c72b1f

  • memory/1440-0-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB

  • memory/3100-5-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB