Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04/02/2024, 00:40
Static task
static1
Behavioral task
behavioral1
Sample
8dc7e0acd7054efd3a8836c100d6e841.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8dc7e0acd7054efd3a8836c100d6e841.exe
Resource
win10v2004-20231215-en
General
-
Target
8dc7e0acd7054efd3a8836c100d6e841.exe
-
Size
1.9MB
-
MD5
8dc7e0acd7054efd3a8836c100d6e841
-
SHA1
80c158f2c536316c520e600918ee057a0baf4289
-
SHA256
5e2822783ece2d53963b7bfbcd74b1345c63e8b9f760699b4e86ab36145eddc2
-
SHA512
b91ed124b59c1ec3aefc1d9cb259cdf91480b4d4a556c5d836638f1ce0be2b1fb0ac969b1b202f0833fb75d3762c44deb13943463afeaec99014be6bb32a4db6
-
SSDEEP
49152:Qoa1taC070dFJtJ0+jepMsQ+BOMsUPEBltB3vEdZRPA:Qoa1taC0+q+jynbPELvYRY
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4416 7138.tmp -
Executes dropped EXE 1 IoCs
pid Process 4416 7138.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1400 wrote to memory of 4416 1400 8dc7e0acd7054efd3a8836c100d6e841.exe 84 PID 1400 wrote to memory of 4416 1400 8dc7e0acd7054efd3a8836c100d6e841.exe 84 PID 1400 wrote to memory of 4416 1400 8dc7e0acd7054efd3a8836c100d6e841.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\8dc7e0acd7054efd3a8836c100d6e841.exe"C:\Users\Admin\AppData\Local\Temp\8dc7e0acd7054efd3a8836c100d6e841.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Users\Admin\AppData\Local\Temp\7138.tmp"C:\Users\Admin\AppData\Local\Temp\7138.tmp" --splashC:\Users\Admin\AppData\Local\Temp\8dc7e0acd7054efd3a8836c100d6e841.exe 36E96EFE30D0991E45273779A58725ADAB3B3F10C3D4C5DA4E51E0FF52922CA68DBAF896A21246D7C4E31932189947E78B677FF939940264C8A202C784EE47D82⤵
- Deletes itself
- Executes dropped EXE
PID:4416
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD552645bbac6113d81bac1d4b2aab837c9
SHA1433d2a9305c76cc319cb490244e4d0ecc3f0659a
SHA25665803d3dfe629245455cc731a1b7fb168711c85cc840c0961649109b58239871
SHA512ae8fa67c62cdb005b4e1cd6248fbf33a4d52c468259b705e352de13f1843925334e8ed75fb007c31b977ca264f9bc16675fc04e55a8e5af1972ce8b9d4abda51