Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/03/2024, 10:01
Static task
static1
Behavioral task
behavioral1
Sample
db1246b73a43950a9ab702ec62f5e11c7b99d32df8fc06de2a6270b4706b56b6.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
db1246b73a43950a9ab702ec62f5e11c7b99d32df8fc06de2a6270b4706b56b6.exe
Resource
win10v2004-20240226-en
General
-
Target
db1246b73a43950a9ab702ec62f5e11c7b99d32df8fc06de2a6270b4706b56b6.exe
-
Size
816KB
-
MD5
b839fc872ccde58809f3eb72d0c6960a
-
SHA1
510d05a3b1024b8f172b672f8440df41b51be2a4
-
SHA256
db1246b73a43950a9ab702ec62f5e11c7b99d32df8fc06de2a6270b4706b56b6
-
SHA512
07177c4ee742c908c1a9304b323dd7e3b3a8e78cf1c82af5e50fbbbe3d29060ec1b721b97a15ec11860743e4957ae92f04e61b52de9a5fa35a33f980f6332fd0
-
SSDEEP
24576:7Y4G2qLMJalsnqShyoo77lUabuSvbDQOOdIxJsG9g:U3XZynV4oDabuWbDQOcIxJJ9g
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3004 1B0C0F0C120A156E155C15A0D0E160E0A160A.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 3632 db1246b73a43950a9ab702ec62f5e11c7b99d32df8fc06de2a6270b4706b56b6.exe 3004 1B0C0F0C120A156E155C15A0D0E160E0A160A.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3632 wrote to memory of 3004 3632 db1246b73a43950a9ab702ec62f5e11c7b99d32df8fc06de2a6270b4706b56b6.exe 96 PID 3632 wrote to memory of 3004 3632 db1246b73a43950a9ab702ec62f5e11c7b99d32df8fc06de2a6270b4706b56b6.exe 96 PID 3632 wrote to memory of 3004 3632 db1246b73a43950a9ab702ec62f5e11c7b99d32df8fc06de2a6270b4706b56b6.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\db1246b73a43950a9ab702ec62f5e11c7b99d32df8fc06de2a6270b4706b56b6.exe"C:\Users\Admin\AppData\Local\Temp\db1246b73a43950a9ab702ec62f5e11c7b99d32df8fc06de2a6270b4706b56b6.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Users\Admin\AppData\Local\Temp\1B0C0F0C120A156E155C15A0D0E160E0A160A.exeC:\Users\Admin\AppData\Local\Temp\1B0C0F0C120A156E155C15A0D0E160E0A160A.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4204 --field-trial-handle=2700,i,14629483171127516024,12350888228055326066,262144 --variations-seed-version /prefetch:81⤵PID:1544
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
816KB
MD51392896775f39cf9f1c7125802893bd4
SHA1cd975be6088f970839327746da9a164185c26d2a
SHA256e54e2186ec04949cdd654eafde6742618833267a5567f22d3b48dab9d44538ca
SHA512942d944398ac2c101125eaad80cf340714f430ea66d3ffb949699e233fc3e7f7bebb30ad654b9cf8c83011b705267a7bc8898f28e103f1b0811c635ccf822b43