Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19/03/2024, 03:04
Static task
static1
Behavioral task
behavioral1
Sample
d50c70f640c7bcce45131be09d6ee7f3.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d50c70f640c7bcce45131be09d6ee7f3.exe
Resource
win10v2004-20240226-en
General
-
Target
d50c70f640c7bcce45131be09d6ee7f3.exe
-
Size
744KB
-
MD5
d50c70f640c7bcce45131be09d6ee7f3
-
SHA1
507ac30eff4e1f1aeb8794bc96f846ca3c7d27af
-
SHA256
467cfff8d80dd8c10e59807ada4a4e48409bbbd482364d10c9b93eef63061046
-
SHA512
1b8abc90890966ede98e1c6e83bc7e523a3e2d45ee366b81e88e11f161ed5e21f3e12bbca2632908e2df29dbc0a2b7642104e9a012d68ce5ab057fa7471fea11
-
SSDEEP
12288:uaHc64b888888888888W888888888889jscV7TdjL47zdU5imqsX3sv33rD+zG/d:F86IIW7uvmQBsHUezG/aYFkJR30F6rpM
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 956 d50c70f640c7bcce45131be09d6ee7f3.tmp -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 11 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3160 wrote to memory of 956 3160 d50c70f640c7bcce45131be09d6ee7f3.exe 89 PID 3160 wrote to memory of 956 3160 d50c70f640c7bcce45131be09d6ee7f3.exe 89 PID 3160 wrote to memory of 956 3160 d50c70f640c7bcce45131be09d6ee7f3.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\d50c70f640c7bcce45131be09d6ee7f3.exe"C:\Users\Admin\AppData\Local\Temp\d50c70f640c7bcce45131be09d6ee7f3.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\Users\Admin\AppData\Local\Temp\is-G4V0P.tmp\d50c70f640c7bcce45131be09d6ee7f3.tmp"C:\Users\Admin\AppData\Local\Temp\is-G4V0P.tmp\d50c70f640c7bcce45131be09d6ee7f3.tmp" /SL5="$C0042,371795,121344,C:\Users\Admin\AppData\Local\Temp\d50c70f640c7bcce45131be09d6ee7f3.exe"2⤵
- Executes dropped EXE
PID:956
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD534acc2bdb45a9c436181426828c4cb49
SHA15adaa1ac822e6128b8d4b59a54d19901880452ae
SHA2569c81817acd4982632d8c7f1df3898fca1477577738184265d735f49fc5480f07
SHA512134ff4022571efd46f7a62e99b857ebe834e9916c786345908010f9e1fb90be226b740ddee16ae9290fe45c86be7238c4555e422abe66a461d11545e19734beb