Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/02/2024, 00:40

General

  • Target

    8dc7e0acd7054efd3a8836c100d6e841.exe

  • Size

    1.9MB

  • MD5

    8dc7e0acd7054efd3a8836c100d6e841

  • SHA1

    80c158f2c536316c520e600918ee057a0baf4289

  • SHA256

    5e2822783ece2d53963b7bfbcd74b1345c63e8b9f760699b4e86ab36145eddc2

  • SHA512

    b91ed124b59c1ec3aefc1d9cb259cdf91480b4d4a556c5d836638f1ce0be2b1fb0ac969b1b202f0833fb75d3762c44deb13943463afeaec99014be6bb32a4db6

  • SSDEEP

    49152:Qoa1taC070dFJtJ0+jepMsQ+BOMsUPEBltB3vEdZRPA:Qoa1taC0+q+jynbPELvYRY

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8dc7e0acd7054efd3a8836c100d6e841.exe
    "C:\Users\Admin\AppData\Local\Temp\8dc7e0acd7054efd3a8836c100d6e841.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1400
    • C:\Users\Admin\AppData\Local\Temp\7138.tmp
      "C:\Users\Admin\AppData\Local\Temp\7138.tmp" --splashC:\Users\Admin\AppData\Local\Temp\8dc7e0acd7054efd3a8836c100d6e841.exe 36E96EFE30D0991E45273779A58725ADAB3B3F10C3D4C5DA4E51E0FF52922CA68DBAF896A21246D7C4E31932189947E78B677FF939940264C8A202C784EE47D8
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:4416

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7138.tmp

    Filesize

    1.9MB

    MD5

    52645bbac6113d81bac1d4b2aab837c9

    SHA1

    433d2a9305c76cc319cb490244e4d0ecc3f0659a

    SHA256

    65803d3dfe629245455cc731a1b7fb168711c85cc840c0961649109b58239871

    SHA512

    ae8fa67c62cdb005b4e1cd6248fbf33a4d52c468259b705e352de13f1843925334e8ed75fb007c31b977ca264f9bc16675fc04e55a8e5af1972ce8b9d4abda51

  • memory/1400-0-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB

  • memory/4416-5-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB