Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/03/2024, 22:38
Static task
static1
Behavioral task
behavioral1
Sample
c1c8a989b1835396f57dbe6457aa3c89.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c1c8a989b1835396f57dbe6457aa3c89.exe
Resource
win10v2004-20240226-en
General
-
Target
c1c8a989b1835396f57dbe6457aa3c89.exe
-
Size
6.0MB
-
MD5
c1c8a989b1835396f57dbe6457aa3c89
-
SHA1
d8124e7f7e993786abaf84a3dfd8f6699da1c326
-
SHA256
bfcc2917e52d5146b26850df0356a25af0b30b683aec08c265824c2eae4867df
-
SHA512
d9fbcd46d21430289e6869b2756e94990c291a483627d21852bfd54a6ec549f10202060a39dcd3a4f761034aaaddba6fb6c127a501f663a53f7e9068f196b3cf
-
SSDEEP
98304:/zeoDRJ/WoD1rHRk4srTRPnpRXQKaoVASgT4eB:be0Jv6TBvpRXxt+SeB
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 228 set thread context of 4920 228 c1c8a989b1835396f57dbe6457aa3c89.exe 90 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4920 c1c8a989b1835396f57dbe6457aa3c89.exe 4920 c1c8a989b1835396f57dbe6457aa3c89.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4920 c1c8a989b1835396f57dbe6457aa3c89.exe 4920 c1c8a989b1835396f57dbe6457aa3c89.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 228 wrote to memory of 4920 228 c1c8a989b1835396f57dbe6457aa3c89.exe 90 PID 228 wrote to memory of 4920 228 c1c8a989b1835396f57dbe6457aa3c89.exe 90 PID 228 wrote to memory of 4920 228 c1c8a989b1835396f57dbe6457aa3c89.exe 90 PID 228 wrote to memory of 4920 228 c1c8a989b1835396f57dbe6457aa3c89.exe 90 PID 228 wrote to memory of 4920 228 c1c8a989b1835396f57dbe6457aa3c89.exe 90 PID 228 wrote to memory of 4920 228 c1c8a989b1835396f57dbe6457aa3c89.exe 90 PID 228 wrote to memory of 4920 228 c1c8a989b1835396f57dbe6457aa3c89.exe 90 PID 228 wrote to memory of 4920 228 c1c8a989b1835396f57dbe6457aa3c89.exe 90 PID 228 wrote to memory of 4920 228 c1c8a989b1835396f57dbe6457aa3c89.exe 90 PID 228 wrote to memory of 4920 228 c1c8a989b1835396f57dbe6457aa3c89.exe 90 PID 228 wrote to memory of 4920 228 c1c8a989b1835396f57dbe6457aa3c89.exe 90 PID 228 wrote to memory of 4920 228 c1c8a989b1835396f57dbe6457aa3c89.exe 90 PID 228 wrote to memory of 4920 228 c1c8a989b1835396f57dbe6457aa3c89.exe 90 PID 228 wrote to memory of 4920 228 c1c8a989b1835396f57dbe6457aa3c89.exe 90 PID 228 wrote to memory of 4920 228 c1c8a989b1835396f57dbe6457aa3c89.exe 90 PID 228 wrote to memory of 4920 228 c1c8a989b1835396f57dbe6457aa3c89.exe 90 PID 228 wrote to memory of 4920 228 c1c8a989b1835396f57dbe6457aa3c89.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1c8a989b1835396f57dbe6457aa3c89.exe"C:\Users\Admin\AppData\Local\Temp\c1c8a989b1835396f57dbe6457aa3c89.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Users\Admin\AppData\Local\Temp\c1c8a989b1835396f57dbe6457aa3c89.exe"C:\Users\Admin\AppData\Local\Temp\c1c8a989b1835396f57dbe6457aa3c89.exe" ""2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4920
-