Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
14/03/2024, 02:46
Static task
static1
Behavioral task
behavioral1
Sample
c77c52ee547d6ebe30a5a27020a9fba3.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c77c52ee547d6ebe30a5a27020a9fba3.exe
Resource
win10v2004-20240226-en
General
-
Target
c77c52ee547d6ebe30a5a27020a9fba3.exe
-
Size
1.9MB
-
MD5
c77c52ee547d6ebe30a5a27020a9fba3
-
SHA1
21ced22cecfd838ecc42df1fcdf559496087ca61
-
SHA256
beee087eb16700e659673e8f235599715ac64744e5c13413b28e69721af677fa
-
SHA512
ba4ab73e38c027e575e7390cd9a77b125ce8b08b23f0a46860a15c74a1198c659b80d6e6f4ba85c256dd512c63405d181bdd58d1693317701d1a34de699f3899
-
SSDEEP
24576:N2oo60HPdt+1CRiY2eOBvcj3u10dqPHuhZd+w4lLdDb/8mT79+OdI7EWukHYmZMT:Qoa1taC070doCb+vd//3klboaKaPQH
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3284 4CC3.tmp -
Executes dropped EXE 1 IoCs
pid Process 3284 4CC3.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4644 wrote to memory of 3284 4644 c77c52ee547d6ebe30a5a27020a9fba3.exe 101 PID 4644 wrote to memory of 3284 4644 c77c52ee547d6ebe30a5a27020a9fba3.exe 101 PID 4644 wrote to memory of 3284 4644 c77c52ee547d6ebe30a5a27020a9fba3.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\c77c52ee547d6ebe30a5a27020a9fba3.exe"C:\Users\Admin\AppData\Local\Temp\c77c52ee547d6ebe30a5a27020a9fba3.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Users\Admin\AppData\Local\Temp\4CC3.tmp"C:\Users\Admin\AppData\Local\Temp\4CC3.tmp" --splashC:\Users\Admin\AppData\Local\Temp\c77c52ee547d6ebe30a5a27020a9fba3.exe B33088623A2D99D7FC64AB28FA3C2435014A8621F6F971ABC9D847D4E6AB506B2F2FC5E163DB24F348ACDEBED6B3B24CFE47CC03FFAEB29041EF0EBEE8B7EB952⤵
- Deletes itself
- Executes dropped EXE
PID:3284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1340 --field-trial-handle=2356,i,13261194862334667799,7441241219475888176,262144 --variations-seed-version /prefetch:81⤵PID:1996
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD56fe04e35e081a8ff3dd824498feec5ea
SHA1b9ea1ea1f8dec4f1e9ea2f5996d06e6c66fc82d9
SHA2564a01502e6c561f6292a508319c0b8baca858ffffc97d267a0cd7a72f2ab05ff4
SHA5121200125cd650f92e19bae92e096afc2d112567509da34281bc409f420daaefbd03c463fa4c3b8c863049dac477e1149c150ac935a7b5245bcd6783627751c8af