Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
07/03/2024, 17:47
Static task
static1
Behavioral task
behavioral1
Sample
14199e1ef7ff66ab9115687619df08dd3d7e84e09005bd69c5bb25de989be565.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
14199e1ef7ff66ab9115687619df08dd3d7e84e09005bd69c5bb25de989be565.exe
Resource
win10v2004-20240226-en
General
-
Target
14199e1ef7ff66ab9115687619df08dd3d7e84e09005bd69c5bb25de989be565.exe
-
Size
92KB
-
MD5
0a9febe5cc75b3577d768654aa4efc6e
-
SHA1
fc62abdf5ae77e0ffc8caf036084fcf9dbcb2405
-
SHA256
14199e1ef7ff66ab9115687619df08dd3d7e84e09005bd69c5bb25de989be565
-
SHA512
73988b9399a08a0ddd0602fc0901f27e8cb8fa43db7ea86a366982b5ae5ad82d3515bf2b909b027647c24b92fd8ec1a000c91027373a68ba0e35f8035653843e
-
SSDEEP
1536:0MA7W59lPYpBCvXkd/DKO7FcwY2fL9C4zxcSsxAlLKnMSQe:tu0DYpBXDKO7FDYuL9C4Ix/
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1708 olacweegim.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 53 checkip.dyndns.org -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 224 wrote to memory of 1708 224 14199e1ef7ff66ab9115687619df08dd3d7e84e09005bd69c5bb25de989be565.exe 92 PID 224 wrote to memory of 1708 224 14199e1ef7ff66ab9115687619df08dd3d7e84e09005bd69c5bb25de989be565.exe 92 PID 224 wrote to memory of 1708 224 14199e1ef7ff66ab9115687619df08dd3d7e84e09005bd69c5bb25de989be565.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\14199e1ef7ff66ab9115687619df08dd3d7e84e09005bd69c5bb25de989be565.exe"C:\Users\Admin\AppData\Local\Temp\14199e1ef7ff66ab9115687619df08dd3d7e84e09005bd69c5bb25de989be565.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Users\Admin\AppData\Local\Temp\olacweegim.exeC:\Users\Admin\AppData\Local\Temp\olacweegim.exe2⤵
- Executes dropped EXE
PID:1708
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5a61d546dabb83bb9f925dedeb82ac719
SHA11c997b1625bfc5e4b9dbc4845c85222ef8dc1df1
SHA2565f83513f877ab7ce813fec50fdc4501fa9698d8f5ab4196b3fa0419dfef065c9
SHA512557a3f0abb865a53d046680c9f648fec8456f38786607c26131398247753c40b722c25cb7e150bdbd5e190986d915e0fa5ec3d0917ab57f4c1e2d408f0acf500