Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
25/03/2024, 17:04
Static task
static1
Behavioral task
behavioral1
Sample
de821d2514c948fe04b2c6d47334012a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
de821d2514c948fe04b2c6d47334012a.exe
Resource
win10v2004-20240226-en
General
-
Target
de821d2514c948fe04b2c6d47334012a.exe
-
Size
717KB
-
MD5
de821d2514c948fe04b2c6d47334012a
-
SHA1
3eaf1268d686d6aa30000e6224c3467ac2e49ec6
-
SHA256
b75a4fd5561af36e042ad8ff0065f21e89305bb2a8fb6d4b25d2158c4b3e0dad
-
SHA512
f183e9ea5a9532e68a2132de6178e958aa1bb6705893e1053df22032e6e0ff11a02a4e9439813d0858a465e5685529938eb38511e2716e64a3ec942b2010626f
-
SSDEEP
12288:mGwF8DRXgVPqaoXNoEixlbjDm+3z2AJLDl16ncmglhRvpwkFuK8dilJJYLKJw8a:7zXKqa8SEijjC+37li6hPHGirn28a
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2600 k.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\dqgoqmy\k.exe de821d2514c948fe04b2c6d47334012a.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4816 wrote to memory of 2600 4816 de821d2514c948fe04b2c6d47334012a.exe 89 PID 4816 wrote to memory of 2600 4816 de821d2514c948fe04b2c6d47334012a.exe 89 PID 4816 wrote to memory of 2600 4816 de821d2514c948fe04b2c6d47334012a.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\de821d2514c948fe04b2c6d47334012a.exe"C:\Users\Admin\AppData\Local\Temp\de821d2514c948fe04b2c6d47334012a.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Program Files (x86)\dqgoqmy\k.exe"C:\Program Files (x86)\dqgoqmy\k.exe"2⤵
- Executes dropped EXE
PID:2600
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
744KB
MD5c06d8b4684a903aa175dcdbb50e37ac7
SHA1467b2919e42c3137f5114d8d7d364f7ba1963b87
SHA25604ac33abeb75037e0e4a09ce086a993e76d6ae568320e3dba6900c16cab57898
SHA512eaf4516cef98c71c2adaf299b1ae225c8c3ec2c41be542b0893d485ea440fd076291c47373e96a96d0c3968d8f22c59956b734551b5d791ea6c82c1cdf139211