Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
158s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
12/03/2024, 18:08
Static task
static1
Behavioral task
behavioral1
Sample
c404428e3c4882a7e72f7688fcb8ffca.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c404428e3c4882a7e72f7688fcb8ffca.exe
Resource
win10v2004-20240226-en
General
-
Target
c404428e3c4882a7e72f7688fcb8ffca.exe
-
Size
650KB
-
MD5
c404428e3c4882a7e72f7688fcb8ffca
-
SHA1
eabcce9bd58ae82abf2114eeac601f6a17a021eb
-
SHA256
d6601c0378cd3c9fb397bad52d0bf87b52878a5d6e9ea08ef6d26d00a51567c1
-
SHA512
2f5a61c59ee1e173c2d1b189279e9fca4245996e5e2a842160df7f67013faaa05d07c1b550a44434f37826ebf0f4786b5558b80017c51c629f2a1a02fe63e1fd
-
SSDEEP
12288:IYk5gmEewf9jsx0GAL4fga3iWmVnJdTHoFu6D6/Bg0er1kKDZyAQqOIhL:FvmY9Ix0GALbbdJ5o6yzkKFTQihL
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3212 is-GPVCR.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3976 wrote to memory of 3212 3976 c404428e3c4882a7e72f7688fcb8ffca.exe 87 PID 3976 wrote to memory of 3212 3976 c404428e3c4882a7e72f7688fcb8ffca.exe 87 PID 3976 wrote to memory of 3212 3976 c404428e3c4882a7e72f7688fcb8ffca.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\c404428e3c4882a7e72f7688fcb8ffca.exe"C:\Users\Admin\AppData\Local\Temp\c404428e3c4882a7e72f7688fcb8ffca.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\Users\Admin\AppData\Local\Temp\is-FPT4U.tmp\is-GPVCR.tmp"C:\Users\Admin\AppData\Local\Temp\is-FPT4U.tmp\is-GPVCR.tmp" /SL4 $401F4 C:\Users\Admin\AppData\Local\Temp\c404428e3c4882a7e72f7688fcb8ffca.exe 455572 506882⤵
- Executes dropped EXE
PID:3212
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
324KB
MD51f377b36cbe0d42f0b9d2a78ea64bee9
SHA1088d3618c672541c61d006bdac9bd7056a511501
SHA256e214802f830924632aec1851cca18961d27d63172691dc4fd3d34aee3608344b
SHA51277b75eb43ac5071d2c7b3c5387db71ef8d128c149b502894084f46f4b91d756a50c6583eacb18913254ed3fbeae9d93e75f28437c9551f49c33e497d1be6f4ba
-
Filesize
395KB
MD5eb1261e2cc4be957b57a5bd5bbaf1bfa
SHA154bb1ac5cee9b247b9212859c4cc631de08cdea9
SHA25625c5e5ca292e0511cfe3d88bf940ee3e352308176f5286becbbac5114765c3e5
SHA5124c75fe887c8599d344ebb093c5a86e3b7e265775d02fe9bc22f764cf3b637049f228c330ebb9f9103926bb9e8047fc7e1f08585b0e3025f43c7d0f2e79d36f8f