Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    91s
  • max time network
    122s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/02/2024, 23:38

General

  • Target

    CrackItNow - Internet Download Manager 6.40 Build 11/idman640build11.exe

  • Size

    10.7MB

  • MD5

    f783042cdf96b3c96016ea569c2f2aed

  • SHA1

    aa74942339b7eeae75df8feed487a6a679faa966

  • SHA256

    4b716be29195552715a3efe3d778c435a7988f593f185deeccf158b657af207e

  • SHA512

    94a4da4e903713d9900e0ee305cc68a7b309090fc352f6722e083ec7a4851f173322d68dea6e447216eb26d35514cf67f92aac02beb4ea5d482cd34b0fd3158e

  • SSDEEP

    196608:Zq5pEKTIxtSAWktw8GEWnNFxp6mUYBV7u/rbUfInm0/mlZS0H5EYyQXD2petdh:eOlftwMUFHr8bvvgZTHXKpEj

Score
4/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\CrackItNow - Internet Download Manager 6.40 Build 11\idman640build11.exe
    "C:\Users\Admin\AppData\Local\Temp\CrackItNow - Internet Download Manager 6.40 Build 11\idman640build11.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2596
    • C:\Users\Admin\AppData\Local\Temp\IDM_Setup_Temp\IDM1.tmp
      "C:\Users\Admin\AppData\Local\Temp\IDM_Setup_Temp\IDM1.tmp" -d "C:\Users\Admin\AppData\Local\Temp\IDM_Setup_Temp\"
      2⤵
      • Executes dropped EXE
      PID:1172

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IDM_Setup_Temp\IDM1.tmp

    Filesize

    162KB

    MD5

    9fdb565af52dd0ee10e1b563d0027384

    SHA1

    6c54349545b2f1a732759d160fecf2195115f4fb

    SHA256

    1ffee9043165b94f18d304df9ad24909eca4795a0ffcd4ac1f039202bb61ba00

    SHA512

    95e7c20efdee80369f8191ab165f96a206fae016c4c1d8b27321800744c35e652ff67da35c778bad8253a31e43968d547e6147d145608edf074ccc6a860d336c

  • memory/1172-2-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2596-0-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/2596-3-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB