Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
98s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12/03/2024, 19:13
Static task
static1
Behavioral task
behavioral1
Sample
317d19a0d87b7933cd5e94ecc85ecde0b50f6ee15b85dd073a10026c72c3638c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
317d19a0d87b7933cd5e94ecc85ecde0b50f6ee15b85dd073a10026c72c3638c.exe
Resource
win10v2004-20231215-en
General
-
Target
317d19a0d87b7933cd5e94ecc85ecde0b50f6ee15b85dd073a10026c72c3638c.exe
-
Size
79KB
-
MD5
b07b87409b652f297c8f5f91834e4f08
-
SHA1
781faeb6c45c6c7898ddf082f3a81b5565c14092
-
SHA256
317d19a0d87b7933cd5e94ecc85ecde0b50f6ee15b85dd073a10026c72c3638c
-
SHA512
d6007c5ad6ed71d440adc257eec9a4cd6aacb11ce4b5c9d9d50c3791b7f3b6d4e60f2aa091b0b2dcd2e405e3b827ce4906b56d5a502ae2ff0e4444ba88011394
-
SSDEEP
1536:zvS9+LJ8lZuCUuTOQA8AkqUhMb2nuy5wgIP0CSJ+5y6B8GMGlZ5G:zvS9O8lZuCmGdqU7uy5w9WMy6N5G
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3932 [email protected] -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4060 wrote to memory of 4152 4060 317d19a0d87b7933cd5e94ecc85ecde0b50f6ee15b85dd073a10026c72c3638c.exe 86 PID 4060 wrote to memory of 4152 4060 317d19a0d87b7933cd5e94ecc85ecde0b50f6ee15b85dd073a10026c72c3638c.exe 86 PID 4060 wrote to memory of 4152 4060 317d19a0d87b7933cd5e94ecc85ecde0b50f6ee15b85dd073a10026c72c3638c.exe 86 PID 4152 wrote to memory of 3932 4152 cmd.exe 87 PID 4152 wrote to memory of 3932 4152 cmd.exe 87 PID 4152 wrote to memory of 3932 4152 cmd.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\317d19a0d87b7933cd5e94ecc85ecde0b50f6ee15b85dd073a10026c72c3638c.exe"C:\Users\Admin\AppData\Local\Temp\317d19a0d87b7933cd5e94ecc85ecde0b50f6ee15b85dd073a10026c72c3638c.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Windows\SysWOW64\cmd.exePID:4152
-
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:3932
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\[email protected]
Filesize79KB
MD5675e765c94a2d9ee648080106f1ff1f7
SHA1f91352dc84818245936557369662589702deee1f
SHA256a2efb53cda8cec9e10515563d1f69ded74cdd1087758088e06dddc6df2bcb302
SHA512c07efe040627a51d5a23253c40200bece3607e503e0ab53320ad17b56c96323d4abb74ee96057aec34784cf67b6fd5947ccd48998cf3757294b345c32b98333f