Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04/02/2024, 15:12
Static task
static1
Behavioral task
behavioral1
Sample
8f790262407e8e582448337c47ba79cc.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8f790262407e8e582448337c47ba79cc.exe
Resource
win10v2004-20231215-en
General
-
Target
8f790262407e8e582448337c47ba79cc.exe
-
Size
73KB
-
MD5
8f790262407e8e582448337c47ba79cc
-
SHA1
88eaa893a99045feb7d50e421ffa085a4c977fe6
-
SHA256
47ca2bc6d301920e8a36bca3cc17b74a2c52c0ccac3703c8a543b50ffac5aaa3
-
SHA512
a67ff99cab350d694e241d3658d586f30ac21cf7ed6714d95156f5fd1f905b8de7a37bf425ad3eff3f1ce5009dbfc63b62d746bfafad4e08ee76d57dd7a23767
-
SSDEEP
1536:HbH1xeUhdK5QPqfhVWbdsmA+RjPFLC+e5h+0ZGUGf2g:HreUhdNPqfcxA+HFsh+Og
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2364 [email protected] -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2708 wrote to memory of 4264 2708 8f790262407e8e582448337c47ba79cc.exe 85 PID 2708 wrote to memory of 4264 2708 8f790262407e8e582448337c47ba79cc.exe 85 PID 2708 wrote to memory of 4264 2708 8f790262407e8e582448337c47ba79cc.exe 85 PID 4264 wrote to memory of 2364 4264 cmd.exe 86 PID 4264 wrote to memory of 2364 4264 cmd.exe 86 PID 4264 wrote to memory of 2364 4264 cmd.exe 86 PID 2364 wrote to memory of 4660 2364 [email protected] 87 PID 2364 wrote to memory of 4660 2364 [email protected] 87 PID 2364 wrote to memory of 4660 2364 [email protected] 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f790262407e8e582448337c47ba79cc.exe"C:\Users\Admin\AppData\Local\Temp\8f790262407e8e582448337c47ba79cc.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\SysWOW64\cmd.exePID:4264
-
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:2364
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 00.exe4⤵PID:4660
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\[email protected]
Filesize73KB
MD57e43dc940da8bb69505fe0c857f173c3
SHA17e6f7e4504e1a56c1ae171d12040724d0ddba31b
SHA256f1d7f6f81476a6dc2f80818e68ebbf32ec43fea9174ff90bb2051ecf159d9b5f
SHA512f42aacbde35ebc1296c6e55a00b51adb8ae260ed1f824a868899f33ce08dc7d4d21a13537a3826fbb3fa09cc0c7b6cc31f13abf385724c95cb53bc183c2e44ed
-
Filesize
2KB
MD57b621943a35e7f39cf89f50cc48d7b94
SHA12858a28cf60f38025fffcd0ba2ecfec8511c197d
SHA256bef04c2f89dc115ce2763558933dba1767bf30cda6856d335ae68955923f9991
SHA5124169e664ad4e7e6891a05ceed78465e0ec44879b37fc0de97c014945e10c161f6bfb040efc24edc136e69bb115b2a1327b04cefb58141f712da856129872e8f1