Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/02/2024, 05:52

General

  • Target

    861a4ba24005a1f99c85b8ca51d3f8c9.exe

  • Size

    1.9MB

  • MD5

    861a4ba24005a1f99c85b8ca51d3f8c9

  • SHA1

    df04f796e7e45a3b57b59c4dd73b8a28fc2b3539

  • SHA256

    7ea7ae717196d60d0334b6fc515daf9d7796cb490d32ab63ee47fa9f902da7ab

  • SHA512

    4f7f94eff4886433402847b43ac07075d21eab24b7343b2da8eae0c89d7973bbbc4177d4aad434273790051705d1390163b8299419fd963917264b73f8a410c1

  • SSDEEP

    49152:Qoa1taC070dodJvSqrpE9cd8iSmr2FW1H0n5:Qoa1taC0ldpu9cSi+F04

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\861a4ba24005a1f99c85b8ca51d3f8c9.exe
    "C:\Users\Admin\AppData\Local\Temp\861a4ba24005a1f99c85b8ca51d3f8c9.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:448
    • C:\Users\Admin\AppData\Local\Temp\734B.tmp
      "C:\Users\Admin\AppData\Local\Temp\734B.tmp" --splashC:\Users\Admin\AppData\Local\Temp\861a4ba24005a1f99c85b8ca51d3f8c9.exe 80E691726855A72CDB1D5CB364769AC5BA9AC2810B244800336890CE57177831E671BCD8FE06A723B7D4FF5F030E5A33F9498FE87E5E9846D7B193B4AF84F200
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:3624

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\734B.tmp

    Filesize

    1.9MB

    MD5

    1fddd07687925c43ad89caa2fc7da515

    SHA1

    5b0965064c7a2902cb83861ce24904adf1d7e9e1

    SHA256

    4f5595dcad27f33b38f5f98c49e959e3c3e78b7d04e7d9ea781a6dd3fb536146

    SHA512

    0174646b0665e01fbc07120e120709d451968d7598de222c8625c0b722050de6895ee6fe640eb4d388e59c324760a359f5a3156126bc1fa9fc9dcbf62fbf9cf1

  • memory/448-0-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB

  • memory/3624-5-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB