Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15/03/2024, 22:11
Static task
static1
Behavioral task
behavioral1
Sample
9a156b574a7328d4a0d89024a5d48a6277561a633d6682e92dca466e23b525b2.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9a156b574a7328d4a0d89024a5d48a6277561a633d6682e92dca466e23b525b2.exe
Resource
win10v2004-20240226-en
General
-
Target
9a156b574a7328d4a0d89024a5d48a6277561a633d6682e92dca466e23b525b2.exe
-
Size
79KB
-
MD5
793b403837ebd722f55c6de305aa3c58
-
SHA1
0cc90b5bc492f9a06cc661e6b90b0f4655309462
-
SHA256
9a156b574a7328d4a0d89024a5d48a6277561a633d6682e92dca466e23b525b2
-
SHA512
73fc8c881ab1105abc8fade1e0c4b4ed162db363a3fca606867c7d7709c1370fa3caac450d6cb00f37792739f5b98f452c275bf7a7cd40af7f86d295b01697c1
-
SSDEEP
1536:zvm5Om0rld8Ms1FAOgSmOQA8AkqUhMb2nuy5wgIP0CSJ+5yNB8GMGlZ5G:zvm5OTld8r1QSjGdqU7uy5w9WMyNN5G
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1996 [email protected] -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 968 wrote to memory of 4568 968 9a156b574a7328d4a0d89024a5d48a6277561a633d6682e92dca466e23b525b2.exe 88 PID 968 wrote to memory of 4568 968 9a156b574a7328d4a0d89024a5d48a6277561a633d6682e92dca466e23b525b2.exe 88 PID 968 wrote to memory of 4568 968 9a156b574a7328d4a0d89024a5d48a6277561a633d6682e92dca466e23b525b2.exe 88 PID 4568 wrote to memory of 1996 4568 cmd.exe 89 PID 4568 wrote to memory of 1996 4568 cmd.exe 89 PID 4568 wrote to memory of 1996 4568 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\9a156b574a7328d4a0d89024a5d48a6277561a633d6682e92dca466e23b525b2.exe"C:\Users\Admin\AppData\Local\Temp\9a156b574a7328d4a0d89024a5d48a6277561a633d6682e92dca466e23b525b2.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Windows\SysWOW64\cmd.exePID:4568
-
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:1996
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\[email protected]
Filesize79KB
MD563777f901234c109a2c55de6030d2ffd
SHA12b08f8a44a4fd1163924fa205a5f0d136a39f637
SHA256eaf14ce7be2c4556d9c19ae71e201d4006ac4ffc47b09ffae984fef111d163fa
SHA512706bcd8ff7dd1714fff4896dacedacad0912398bc75745bad654d2e1d931d68df6316cfc5daa4627fd01c876bbbae953db8857ffcb6fbbf0e7bbe4a1659400e8