Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    143s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/03/2024, 17:47

General

  • Target

    14199e1ef7ff66ab9115687619df08dd3d7e84e09005bd69c5bb25de989be565.exe

  • Size

    92KB

  • MD5

    0a9febe5cc75b3577d768654aa4efc6e

  • SHA1

    fc62abdf5ae77e0ffc8caf036084fcf9dbcb2405

  • SHA256

    14199e1ef7ff66ab9115687619df08dd3d7e84e09005bd69c5bb25de989be565

  • SHA512

    73988b9399a08a0ddd0602fc0901f27e8cb8fa43db7ea86a366982b5ae5ad82d3515bf2b909b027647c24b92fd8ec1a000c91027373a68ba0e35f8035653843e

  • SSDEEP

    1536:0MA7W59lPYpBCvXkd/DKO7FcwY2fL9C4zxcSsxAlLKnMSQe:tu0DYpBXDKO7FDYuL9C4Ix/

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\14199e1ef7ff66ab9115687619df08dd3d7e84e09005bd69c5bb25de989be565.exe
    "C:\Users\Admin\AppData\Local\Temp\14199e1ef7ff66ab9115687619df08dd3d7e84e09005bd69c5bb25de989be565.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:224
    • C:\Users\Admin\AppData\Local\Temp\olacweegim.exe
      C:\Users\Admin\AppData\Local\Temp\olacweegim.exe
      2⤵
      • Executes dropped EXE
      PID:1708

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\olacweegim.exe

    Filesize

    92KB

    MD5

    a61d546dabb83bb9f925dedeb82ac719

    SHA1

    1c997b1625bfc5e4b9dbc4845c85222ef8dc1df1

    SHA256

    5f83513f877ab7ce813fec50fdc4501fa9698d8f5ab4196b3fa0419dfef065c9

    SHA512

    557a3f0abb865a53d046680c9f648fec8456f38786607c26131398247753c40b722c25cb7e150bdbd5e190986d915e0fa5ec3d0917ab57f4c1e2d408f0acf500

  • memory/224-0-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/224-5-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/1708-6-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB