Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08/03/2024, 23:22
Static task
static1
Behavioral task
behavioral1
Sample
d1fef049c331d794fddfbee5487cac00d9b31cc441fef992ef81c02e75790e29.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d1fef049c331d794fddfbee5487cac00d9b31cc441fef992ef81c02e75790e29.exe
Resource
win10v2004-20240226-en
General
-
Target
d1fef049c331d794fddfbee5487cac00d9b31cc441fef992ef81c02e75790e29.exe
-
Size
79KB
-
MD5
4368deae5e2d8ff1738a07e9e4ca48da
-
SHA1
e6aedad6cb79bbb66a0f360a1f4d056431f333a1
-
SHA256
d1fef049c331d794fddfbee5487cac00d9b31cc441fef992ef81c02e75790e29
-
SHA512
727a5ddfd7a07173b14c886775e8db6c4809c071732dc6be4c2b203b7815acfd6e1ecaca5b263e9ea79ff2db57519547c5346bb2c644272202cee18d742b7c8c
-
SSDEEP
1536:zvlTXek+q3OQA8AkqUhMb2nuy5wgIP0CSJ+5yytB8GMGlZ5G:zvlikGGdqU7uy5w9WMy6N5G
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4072 [email protected] -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 880 wrote to memory of 4452 880 d1fef049c331d794fddfbee5487cac00d9b31cc441fef992ef81c02e75790e29.exe 89 PID 880 wrote to memory of 4452 880 d1fef049c331d794fddfbee5487cac00d9b31cc441fef992ef81c02e75790e29.exe 89 PID 880 wrote to memory of 4452 880 d1fef049c331d794fddfbee5487cac00d9b31cc441fef992ef81c02e75790e29.exe 89 PID 4452 wrote to memory of 4072 4452 cmd.exe 90 PID 4452 wrote to memory of 4072 4452 cmd.exe 90 PID 4452 wrote to memory of 4072 4452 cmd.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\d1fef049c331d794fddfbee5487cac00d9b31cc441fef992ef81c02e75790e29.exe"C:\Users\Admin\AppData\Local\Temp\d1fef049c331d794fddfbee5487cac00d9b31cc441fef992ef81c02e75790e29.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Windows\SysWOW64\cmd.exePID:4452
-
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:4072
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\[email protected]
Filesize79KB
MD5fc310da9b1cb4529941059e96605ee28
SHA1d50d698ef71e362a96738d9ed2235aa7e712960c
SHA25602744d8de2be5ed08dd46e7053469ff344fd9da8da4300fa665bb59994e8cb7e
SHA5129f01982688ffaab31f9e590f9f9f59b77d0a64a3d0248dec9355fb717eef7c76e901a770c8f75892d908a5e2741d9212cd22682963eab4c790cda6467888b4b9