Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
12/03/2024, 22:04
Static task
static1
Behavioral task
behavioral1
Sample
7a760d0043585078166bbce8451ac6d6b1380613301c09e94b0bd3a5617d843b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7a760d0043585078166bbce8451ac6d6b1380613301c09e94b0bd3a5617d843b.exe
Resource
win10v2004-20240226-en
General
-
Target
7a760d0043585078166bbce8451ac6d6b1380613301c09e94b0bd3a5617d843b.exe
-
Size
73KB
-
MD5
51a381e74b126c48362af96ecc09af0d
-
SHA1
cd4ebe9dec3fe7551f04bc5f0607791bff93b3de
-
SHA256
7a760d0043585078166bbce8451ac6d6b1380613301c09e94b0bd3a5617d843b
-
SHA512
3bdabcef278d97574238b537a4d4e1f79ce134be16808759db444116368078fb009c2c52c7cfac64be2f23427153756530947028f33bd0ad6051a8f215e42311
-
SSDEEP
1536:hbLWt0pG7PK5QPqfhVWbdsmA+RjPFLC+e5ht0ZGUGf2g:hZAPNPqfcxA+HFshtOg
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1464 [email protected] -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3676 wrote to memory of 116 3676 7a760d0043585078166bbce8451ac6d6b1380613301c09e94b0bd3a5617d843b.exe 89 PID 3676 wrote to memory of 116 3676 7a760d0043585078166bbce8451ac6d6b1380613301c09e94b0bd3a5617d843b.exe 89 PID 3676 wrote to memory of 116 3676 7a760d0043585078166bbce8451ac6d6b1380613301c09e94b0bd3a5617d843b.exe 89 PID 116 wrote to memory of 1464 116 cmd.exe 90 PID 116 wrote to memory of 1464 116 cmd.exe 90 PID 116 wrote to memory of 1464 116 cmd.exe 90 PID 1464 wrote to memory of 3356 1464 [email protected] 91 PID 1464 wrote to memory of 3356 1464 [email protected] 91 PID 1464 wrote to memory of 3356 1464 [email protected] 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a760d0043585078166bbce8451ac6d6b1380613301c09e94b0bd3a5617d843b.exe"C:\Users\Admin\AppData\Local\Temp\7a760d0043585078166bbce8451ac6d6b1380613301c09e94b0bd3a5617d843b.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Windows\SysWOW64\cmd.exePID:116
-
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:1464
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 00.exe4⤵PID:3356
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\[email protected]
Filesize73KB
MD5e38630bf2f03653996040385146b7381
SHA1e5fcc21747945413face68a12d016a9cfce9ed60
SHA2566252fb7b2f46aee6997c192a9b1cc37dc78b64d1adee9fdafc099539859d56d7
SHA512419dc2856d998fc360ce3fcfbc243baec9bc0a4c5e56b85b367c252cced54a58e5eed3a9a9ac04c47cca994d2cbebfa63b38c6c70ab680eb64a947a2ae8b5a48
-
Filesize
2KB
MD57b621943a35e7f39cf89f50cc48d7b94
SHA12858a28cf60f38025fffcd0ba2ecfec8511c197d
SHA256bef04c2f89dc115ce2763558933dba1767bf30cda6856d335ae68955923f9991
SHA5124169e664ad4e7e6891a05ceed78465e0ec44879b37fc0de97c014945e10c161f6bfb040efc24edc136e69bb115b2a1327b04cefb58141f712da856129872e8f1