Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
20/03/2024, 01:28
Static task
static1
Behavioral task
behavioral1
Sample
d792ea249e92b5383084ca524944579b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d792ea249e92b5383084ca524944579b.exe
Resource
win10v2004-20240226-en
General
-
Target
d792ea249e92b5383084ca524944579b.exe
-
Size
3.0MB
-
MD5
d792ea249e92b5383084ca524944579b
-
SHA1
372f264c81bf414da0e240031d3471e522df9c9d
-
SHA256
e176289ac2359e1303d1f6fdfbe0b96f979c82c8f34658852795e5cd90fb35ff
-
SHA512
1c60955de168debeff61827e5d7dde3328b123d4b31d28086302507c640fe22f6f6287c7ea787a0e731ae64edfcc7a626600302dd1e6841f80861cdb3755c508
-
SSDEEP
49152:BB+V1aScVdZUErhn3v2ycqRQUFYqOsDVjbp5P8yS27GcDopVQZtksfjSJocrupMp:f+V1a/VdZUErhn/2HqRQUWqOWjbp18Zv
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4548 setup.exe -
Loads dropped DLL 3 IoCs
pid Process 4548 setup.exe 4548 setup.exe 4548 setup.exe -
Suspicious use of SetWindowsHookEx 40 IoCs
pid Process 4548 setup.exe 4548 setup.exe 4548 setup.exe 4548 setup.exe 4548 setup.exe 4548 setup.exe 4548 setup.exe 4548 setup.exe 4548 setup.exe 4548 setup.exe 4548 setup.exe 4548 setup.exe 4548 setup.exe 4548 setup.exe 4548 setup.exe 4548 setup.exe 4548 setup.exe 4548 setup.exe 4548 setup.exe 4548 setup.exe 4548 setup.exe 4548 setup.exe 4548 setup.exe 4548 setup.exe 4548 setup.exe 4548 setup.exe 4548 setup.exe 4548 setup.exe 4548 setup.exe 4548 setup.exe 4548 setup.exe 4548 setup.exe 4548 setup.exe 4548 setup.exe 4548 setup.exe 4548 setup.exe 4548 setup.exe 4548 setup.exe 4548 setup.exe 4548 setup.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4936 wrote to memory of 4548 4936 d792ea249e92b5383084ca524944579b.exe 89 PID 4936 wrote to memory of 4548 4936 d792ea249e92b5383084ca524944579b.exe 89 PID 4936 wrote to memory of 4548 4936 d792ea249e92b5383084ca524944579b.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\d792ea249e92b5383084ca524944579b.exe"C:\Users\Admin\AppData\Local\Temp\d792ea249e92b5383084ca524944579b.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Users\Admin\AppData\Local\Temp\~esetup\setup.exeC:\Users\Admin\AppData\Local\Temp\~esetup\setup.exe setup.dat2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:4548
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5199e87ea6b03e907316560a58f7b51af
SHA18515b7d54e11ba32c52240044164b60b2f112341
SHA2560a0aee69b025f1206af1193b13e0476b49506b7d77ef2ed824ca169cfa749970
SHA5121221b91cad64a7739d2aa676924b87f68aceb66faa0edadd2f7e4fdf51054cae56bd2b846ebf69602fbe180ff0efe0218eb1a342d08ba175105d7b5fd4e4b277
-
Filesize
1.0MB
MD52e24261bd742dfcdf961a23c50a896b0
SHA1861e55a1557a7ef2887e71a2cf1a5380425e84f3
SHA256f3c45763827a7a87ed14379e496f710ec586685c9394cd5f6f8221185f7e7e19
SHA5123682f6686dd8f683c37d29624b376a7d1a81a6db30f8e8e25604fe86a00adcc648933c3c8d4b478509be063a91ea864c10d31a7da7785e5c9a445dbb35da7953
-
Filesize
30KB
MD57de8a9ce8297ab6194783f768d238f7c
SHA1e5277e152d1aafbe7593b1cff1cab92ff812054f
SHA2569599cb4ce9dd8c2260b88f11a47c1e6f44116a14ef57137d63ba551b714c33dc
SHA51233a933ad6ace71a9539a286df0972fe9047475d7a560e9529d15a407eefc9333c762cf065abc9cb1f981af5511aef1f0127844fe6be0b9eaeadf46fe7fde21e3
-
Filesize
48KB
MD537a58e1c5ce48e401ee8dd1d1da54814
SHA1a87d00d78838c2d968b72330ee6f21f69b2caae5
SHA2561c426928fb90bedb31fcffa0f3fbe7bdbca4259f93f5abdefed6a9a089f2982c
SHA512e85052fc305040bdcaf47262e0ce6eef0848b319baac72a076dc94e7d20ea7ad8fbdd7d5381606a3154ab84fe81429bb339123ac1cd94551b1dc9cecfb7a08bf